General

  • Target

    1bd2dbcc03b4268d3579b459fe2fea3a_cryptolocker_JC.exe

  • Size

    93KB

  • MD5

    1bd2dbcc03b4268d3579b459fe2fea3a

  • SHA1

    1da752c3523a6f8ddf0501716c246449e3c8fa63

  • SHA256

    924b36f0c3809273e1d95fd97db058dfb28f1e18d1f8494c96a62b40c6b6ad13

  • SHA512

    17d42e0ac3dfc74c70e6e2dc0e9e917ae72fe88805b67c394234bf51e818b9c1de0c8e5bfeea25d2faeaaf265d6b0c6e6aa78f6e77f752287bf58be828b4e709

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuvB:zCsanOtEvwDpjp

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1bd2dbcc03b4268d3579b459fe2fea3a_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections