General

  • Target

    13c5339f17b11e0f110461eb42d07beb_cryptolocker_JC.exe

  • Size

    62KB

  • MD5

    13c5339f17b11e0f110461eb42d07beb

  • SHA1

    dd46a061efe01f581ab724963598ebba1b042b91

  • SHA256

    e268b9994ee1595c9a1fd03e8e2b8981f8fe48f2ae715873c56600ad9e0b2961

  • SHA512

    37ff6df0c3d878db99a54a85cdad2df04574605a630c89db8d38ed939a77d01175cc1d46a6238b586a112fdce52d5e473132f843a7ec9d23e4bb92f43762f391

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYXUXojZQ:1nK6a+qdOOtEvwDpjz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 13c5339f17b11e0f110461eb42d07beb_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections