General

  • Target

    3d42949917e390ed92a1256e9f90cf88_cryptolocker_JC.exe

  • Size

    94KB

  • MD5

    3d42949917e390ed92a1256e9f90cf88

  • SHA1

    1913a9d3e06ebb647be8321744a03c6ccc1d2099

  • SHA256

    3d7cebdb05fa1f080804d17240fe0f7297210198e11175e247d5664d2dc8a77d

  • SHA512

    f6574a9198357339ee90b8000833070bf8f15306e6db903e8c0fe0c531354513446fa1a603d7ebc0e54f7be0ef9d14d3ef17705c080c616997446ed5a1ed0c6a

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuvv:zCsanOtEvwDpjn

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3d42949917e390ed92a1256e9f90cf88_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections