General

  • Target

    4468a2edd91c463ff983e4d6bbf7abc4_cryptolocker_JC.exe

  • Size

    62KB

  • MD5

    4468a2edd91c463ff983e4d6bbf7abc4

  • SHA1

    84b4b8815c0a14bd006e9f81ac7ac68da2dbde93

  • SHA256

    f80140749363cd9d495fa8661960101e7f7b1173c80115851b7114188bbeda2a

  • SHA512

    b9d1eae162b270c37df9e45cc6b7c4ab7fefd4a19d665d02b842eb0fd088a4710015986049adc382f06ff97057450166d99bef4d6887333d35f5aa93ddc93737

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHwkFV:1nK6a+qdOOtEvwDpjE

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4468a2edd91c463ff983e4d6bbf7abc4_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections