General

  • Target

    19e217de388a19e5c4398f6b65b6646f_cryptolocker_JC.exe

  • Size

    140KB

  • MD5

    19e217de388a19e5c4398f6b65b6646f

  • SHA1

    4e5bb5691b428f9a63598c7bb78828e664d31dc3

  • SHA256

    880742cac9cf6d50818d67e0f61e091f553a8a211d5ef6a6ea88a39d94432ef7

  • SHA512

    c31b3a4fb65bc09461ecd0cf28743d010c77dfd72edcd3d22e3178f1766e35db8033ee6353e4d975e78f04db14e7dd96e4c4588ee36fba4ee35dbb5b92c0f6a4

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699Gx:z6a+CdOOtEvwDpjczQ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 19e217de388a19e5c4398f6b65b6646f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections