General

  • Target

    a21ce190917674cc3f7f51b3ce824a7f_cryptolocker_JC.exe

  • Size

    78KB

  • MD5

    a21ce190917674cc3f7f51b3ce824a7f

  • SHA1

    ffae34fc0e0df08ace8885c2ecf82fe71da693f9

  • SHA256

    450d52fa02b8b0e8f82a9b10bf405e7a2b082ed9eb4e08331316219b2ca501b4

  • SHA512

    d90ad3d62079fbc303171ac1ac481051799f94837efb29155bc02413a5bcbc7027f737075267256463781a48af821fa34a341654b716d5500252af11c1229f49

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUXQaOKTOvO:T6a+rdOOtEvwDpjNw

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a21ce190917674cc3f7f51b3ce824a7f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections