General

  • Target

    a01a0a29eea3206e137e04a57fa1e360_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    a01a0a29eea3206e137e04a57fa1e360

  • SHA1

    f95412736c094edf6cbc475b1dc2c6684297a87d

  • SHA256

    f81dfccb3d48d9e905f101cc327492e0c2c90ff8b00a53e0fbc6d109b6d57cc4

  • SHA512

    b04d8c19266e0d366cf6c09b51da9278bf2c3ecad3aab5bd54bd44aecb5e5eaee11fdbef9f49475f1df76a7332095734512409a1e4ef11cd59b288515db18318

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+g0Cum/kLyMro2GtOOtEvwDpj/:z6QFElP6n+g07mddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a01a0a29eea3206e137e04a57fa1e360_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections