General

  • Target

    482cfb38be2b5a0e90a8d80f4495a4d9_cryptolocker_JC.exe

  • Size

    57KB

  • MD5

    482cfb38be2b5a0e90a8d80f4495a4d9

  • SHA1

    5de4b0497ac5a4d1c6e3fe58bc12587f3803f529

  • SHA256

    ef1fa170d35333da9472b8e3e9587ff25dae86a58118b54e6bfb01d0b09f838b

  • SHA512

    23ae843d287a52829c701a70fd86f2d5b9b141a8677c7880fd5772a414c7e5de63b5f2244ae389f0dd154dc743d06c080337ac44932c92074dc3db860cc81e70

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLaBZoW0UyTq5z4:T6QFElP6n+gxmddpMOtEvwDpjwaTQ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 482cfb38be2b5a0e90a8d80f4495a4d9_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections