General

  • Target

    3881b491b832d0b396312603633bbffc_cryptolocker_JC.exe

  • Size

    62KB

  • MD5

    3881b491b832d0b396312603633bbffc

  • SHA1

    63c5ccc7a72e48c83431db08ed0f707b4c6e40c9

  • SHA256

    f21e060da30ce8b56f95ed693146553334c071a6aa124847637404ba44225642

  • SHA512

    754a17e6bf1148a130e0a112f8e0bcefa9cb6d58fed19b847d316a98af3f8af4995c634e54e70392c88e385c714106c77dcf2d899659d974840a53c1ebcff2d4

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsaLekXWzAK:1nK6a+qdOOtEvwDpjB

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3881b491b832d0b396312603633bbffc_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections