General

  • Target

    114256cbc9af59b3ca72550e26a3a143_cryptolocker_JC.exe

  • Size

    112KB

  • MD5

    114256cbc9af59b3ca72550e26a3a143

  • SHA1

    b6295747d3d826a40ad5399b2314d151e2777c3d

  • SHA256

    fc782561a51260a5f0ad826fbacfb3ea925287ac86b647cbf32d4e9f2d3e05c8

  • SHA512

    e5bb794c7ce4a9636c77f022f4ed555f45b018e1c448f25ae6a15e73a352d0ee98e0a109e420304bee33d25d00076655ec1d60c3500bb0a96c137e46f1ff0df0

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar5:T6a+rdOOtEvwDpjLzw

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 114256cbc9af59b3ca72550e26a3a143_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections