General

  • Target

    4fb620673949863ec1ae44493cc3a2dd_cryptolocker_JC.exe

  • Size

    68KB

  • MD5

    4fb620673949863ec1ae44493cc3a2dd

  • SHA1

    48c3eb84e3e5c71c1b44ba531ee4a334a0a16556

  • SHA256

    e83510701b91185c13b398e12d21201333edc0ed8ee0fb372c47e73e20326a0a

  • SHA512

    f0b5981a03f742ea2ff4b849b0ccd83dcf286365fba6a19fa49ec5630789a010827061391096001f0c44aea6224ced52280bd641d5c058bdcafc64751461e3ba

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYfKhBUzIp:1nK6a+qdOOtEvwDpjn

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4fb620673949863ec1ae44493cc3a2dd_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections