General

  • Target

    674da4a1ea80dc97198349f23b1ac2ba_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    674da4a1ea80dc97198349f23b1ac2ba

  • SHA1

    c886355109c5c774c0c4d2862673426195d7315c

  • SHA256

    b48014331aa67274f8724ca6e875316fbc5092f87583a5383070b48fb2229884

  • SHA512

    41fcf5f8f52472046637c0f046c09e7914fa8c3a0c9547d58e837fe030f00453e514ef5024adfd3cad3fe2b9394d08ced76f20073e4ec7917aa74249ab7e010b

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAvL:z6a+CdOOtEvwDpjQc

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 674da4a1ea80dc97198349f23b1ac2ba_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections