General

  • Target

    0b42b8500b4928debd157a30dbce5d52_cryptolocker_JC.exe

  • Size

    113KB

  • MD5

    0b42b8500b4928debd157a30dbce5d52

  • SHA1

    3ed1d2d321b7458e46f3a182debbbd037ba246e2

  • SHA256

    b5fed2a6bb4390e9296f69f8e649f992c59d9b30c1f5d4d7ead9b95ecc88e09a

  • SHA512

    4f6d05d554e1322245e3a40b798468cb1383690550f738c71e0eda1d933ae63f7f180f39b102c49d6b8eac30e5be6f637dfb38c03b42f3fe3484ca84027faf61

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp+ofg:z6a+CdOOtEvwDpjcz3

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0b42b8500b4928debd157a30dbce5d52_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections