General

  • Target

    21d16b8acca556d562e4efd72c735045_cryptolocker_JC.exe

  • Size

    80KB

  • MD5

    21d16b8acca556d562e4efd72c735045

  • SHA1

    fc7a6bdc1bb05c9b381afc3dbc7cb0af3f747231

  • SHA256

    81ad7f7c997a2a4b88acbfa3373b4b0753a475dc8a6223e9c8dcecfb64eb09df

  • SHA512

    48a534326bb4947712b30835a21fd3be3e2ef4d00c2111df405775f91fc9c4ed0576df642f05fd8c961ba63d84c1c90cca0e20ee08a1bede449520af5caeccce

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnU5GY:1nK6a+qdOOtEvwDpjw

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 21d16b8acca556d562e4efd72c735045_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections