General

  • Target

    14830d9f36653fd16633be626fa762c3_cryptolocker_JC.exe

  • Size

    62KB

  • MD5

    14830d9f36653fd16633be626fa762c3

  • SHA1

    c7d245cecb8719383d9f10f396cbb128cd104229

  • SHA256

    22b5cd6de14042d0d44984e4402e4a9b684c4a4d5b22333c197d74ee775149b2

  • SHA512

    c08da3259efbb553c758cab41c5c06f8472fcf30bbcd010344222cf64a962b254eef2c5bab4a410a8365e9ee00e4fd2a3a4f149eff1ff91418104cd58461a9ca

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYXUXojZJW:1nK6a+qdOOtEvwDpj3

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 14830d9f36653fd16633be626fa762c3_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections