General

  • Target

    61aa2ae037d1c951f8ddfd335c3ffe74_cryptolocker_JC.exe

  • Size

    139KB

  • MD5

    61aa2ae037d1c951f8ddfd335c3ffe74

  • SHA1

    4fb59e78aded66a7ae027bbd6212ce56b611c243

  • SHA256

    4383eaf1c7ab14d0f62f112be3456ffe961e7972c57c4c1b1af4a348400efa30

  • SHA512

    d43534806edb4a5b4b10f5c4a282a4928596d71ed1b9e37cba1d8bfdb637d6074379a3fc4a02f107346f44b6615e0ec0d17749ca5067e91e8905161a771cd3a1

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GX2fF:z6a+CdOOtEvwDpjczJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 61aa2ae037d1c951f8ddfd335c3ffe74_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections