General

  • Target

    04417f75b3b20a8bb7b003caa48a05ca_cryptolocker_JC.exe

  • Size

    92KB

  • MD5

    04417f75b3b20a8bb7b003caa48a05ca

  • SHA1

    5fd692698f8f9db1198a5d4bab0188325afb8f9a

  • SHA256

    73f31b01b269de13435c37cfb74f21ebd66dd669800ac64df68094a3f9871052

  • SHA512

    f1d9849c5251d19f9c19a2046f75d5629748772f3ca46bf8585b1baaa9ebf084e1551052fbf9d6da72446a83df095bfb07c3c8ed2b5d2f7fd4e9a88a366ce97b

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuvE:zCsanOtEvwDpjc

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 04417f75b3b20a8bb7b003caa48a05ca_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections