General

  • Target

    4295caa2437880c5f583946020aa1622_cryptolocker_JC.exe

  • Size

    79KB

  • MD5

    4295caa2437880c5f583946020aa1622

  • SHA1

    4c4798abb7bf18505b60792a3adef873d6bb97a9

  • SHA256

    df3c1a187f2dffac517d6b3a8b981fd3f63c494c0826181586acfac85e9119cf

  • SHA512

    06a3c56168b43bfadfee89acbb2ca27ea29608c6e2b3581c8468c038c7eecf990d9ee77d363e8e666309a506de916f7b5eab753f53e5951aa074f7af68c9f61a

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnU5Gd:1nK6a+qdOOtEvwDpjl

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4295caa2437880c5f583946020aa1622_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections