General

  • Target

    384f5ad86fa3bbe14923b3d711a8a8db_cryptolocker_JC.exe

  • Size

    59KB

  • MD5

    384f5ad86fa3bbe14923b3d711a8a8db

  • SHA1

    0c7914e4873c377ea8a040d8212137c0dabad029

  • SHA256

    c80cf31ba70fd7bce2d204625fcd201c57ca167f6053e198a144b104853b0bab

  • SHA512

    84d641db33690d072d54d438ea2b621f9f0114d0c53318f96e8296e11979b5432ce307882e8490bc44e3a9c3c1735a85ff358035cb1a41e30a8c9fa3315a78f6

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLaBZoW0UyTq5ziFa9:T6QFElP6n+gxmddpMOtEvwDpjwaTqF+

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 384f5ad86fa3bbe14923b3d711a8a8db_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections