General

  • Target

    a215f1744b22a81590a70c2113c79e1a_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    a215f1744b22a81590a70c2113c79e1a

  • SHA1

    8b0cc5c00ac534f755a83770fa3c892685e08956

  • SHA256

    45639539ee4dc096c5140395cf08cd8b049853fc9cf89648a4216ebd2b389efa

  • SHA512

    cbbbfd28afe3a9bfa800b34d4b44a7b57fb09bd8368897f7504d9fa60df2cb6980f7a76a2cb5cb41196ad541b2c3d9b475e1bdfd00adcc70c2ce9d9fe9306eb5

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gr:1nK6a+qdOOtEvwDpjr

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a215f1744b22a81590a70c2113c79e1a_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections