General

  • Target

    342456c8bbfae88db61dd60bd389f0fc_cryptolocker_JC.exe

  • Size

    73KB

  • MD5

    342456c8bbfae88db61dd60bd389f0fc

  • SHA1

    9710c237575e229318f490b0c8ae299197a50d7e

  • SHA256

    05272fd5aca1fa13c80c97e58282dbebe3201dc97c058d001f6bb0e8d48a340b

  • SHA512

    30abffee5107836172185c94bae2734765692d3f90209b2c0aaf6579a3446c44e309e819b9d226cfc05849bc35be8c47cbb94d8f7ba93e5d0b1b015c4fc9e970

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7pBlqrr1HBJooSeKzu1adyBR:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyH

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 342456c8bbfae88db61dd60bd389f0fc_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections