General

  • Target

    110988388179187915a8d26b138df943_cryptolocker_JC.exe

  • Size

    112KB

  • MD5

    110988388179187915a8d26b138df943

  • SHA1

    646aa62b0e14e7c1701eba2652bd8b4b18fab3e8

  • SHA256

    ecad47822acea08dd20106f972fd0673494f749e8d1497d8e84031ed50e6d184

  • SHA512

    9bfcfbad08304fbbf2465e05913d4f637f7af6dcfc9f77c8b1f52bed9bf5c53e27d845a905ca3c38d9e8e854a4a23ac12305c770f327bdc25d6a06935f6abf2d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp69T:T6a+rdOOtEvwDpjLz1

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 110988388179187915a8d26b138df943_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections