General

  • Target

    46b2c755ed195a71b61e8b4c8cac6ae3_cryptolocker_JC.exe

  • Size

    59KB

  • MD5

    46b2c755ed195a71b61e8b4c8cac6ae3

  • SHA1

    4651fe66fd457ca496c3efe00afe59252fd4275c

  • SHA256

    cfae4ce6422c9645b2eb3808ef7493e6da61fd47a2434a71ca0ff6eae0bbf2e8

  • SHA512

    18ed00d88719c81c06752039d419a2cf192581f81189be053d0445ecf8a93783094b4d683f740e715c8bb3e5b646a140c6435e01731b423df898a7233ba36b5f

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLaBZoW0UyTq5ziFau:T6QFElP6n+gxmddpMOtEvwDpjwaTqFd

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 46b2c755ed195a71b61e8b4c8cac6ae3_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections