General

  • Target

    44ab9aad864c916ab5249055370c6da1_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    44ab9aad864c916ab5249055370c6da1

  • SHA1

    558bad5d694d95fe716fc00c7953903ec3ce08ee

  • SHA256

    89b250482760bb9fcff51c956a2e743ec9dfe8ce79c5f1d1778ac11f36c0a0e4

  • SHA512

    d6cea5aa7f746c252456d30816d840cd45fa00140fd614af6729f772249eeb16a69962359fee9ea710296c5c8e8ef5e4bac2226d49f0a26d5ba84c3b29a81daa

  • SSDEEP

    768:qgmnjO6LsoEEeegiZPvEhHSG+gZ0Mum/kLyMro2GtOOtEvwDpj:qgmnK6QFElP6n+gZ0ZmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 44ab9aad864c916ab5249055370c6da1_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections