General

  • Target

    4d99ec37b7a18f1615ef81d51acf73da_cryptolocker_JC.exe

  • Size

    84KB

  • MD5

    4d99ec37b7a18f1615ef81d51acf73da

  • SHA1

    197830657b5a36a4a16d920abe42e4768cfd71a1

  • SHA256

    23978b8a3e6cb96d3c2528d633724246d7bf5299d282be77de8daa65850dfc2f

  • SHA512

    0947889739e780000d78a34929feebfb9b789d7b781aa3321c7e17616101c1003e20296955651336c1a69d3ae096f2e74ccf99c83ea0c2fbedf7eb8e2fd91d14

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUC9u:1nK6a+qdOOtEvwDpjO

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4d99ec37b7a18f1615ef81d51acf73da_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections