General

  • Target

    4be21c17b8529dfe18485e2f61b33e5f_cryptolocker_JC.exe

  • Size

    73KB

  • MD5

    4be21c17b8529dfe18485e2f61b33e5f

  • SHA1

    cbb0670deb38845ce1f121f4fe49d00b230e052e

  • SHA256

    68939c4b68793e1a19107844d3e89efe1fd5c8ee97f0e03592578085d0d67ce4

  • SHA512

    03943161684c95a84b81b0fe01ae76fa785ce95349adc3f7dabddb5556dab138c8bf7e50c56b83b62847f41cc559b36a2aca5483dd49d715124dce5280456fb1

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJq:zCsanOtEvwDpj/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4be21c17b8529dfe18485e2f61b33e5f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections