General

  • Target

    30928555b8ae4f1652c9d2e2a4b98521_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    30928555b8ae4f1652c9d2e2a4b98521

  • SHA1

    c1956ec8ce3b09e519842d793057926028c781c7

  • SHA256

    afbfe96c8111fe4b49ea1edbe2d8db9e405a797c5bed5c90df8cba0d86eacd75

  • SHA512

    987b9e7bb96ff6369c8693f3e9bba820c8830c6b1324c7a0af3f6e4322c60f47bc7ee6571ac115c2a6a25e525559c8242e61b62d9596b6e13355524af416cd9f

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAvW:z6a+CdOOtEvwDpjQF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 30928555b8ae4f1652c9d2e2a4b98521_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections