General

  • Target

    74fa8aaef685d31cf11cd2700a366bda_cryptolocker_JC.exe

  • Size

    58KB

  • MD5

    74fa8aaef685d31cf11cd2700a366bda

  • SHA1

    f5e1486f588241c8153d983e2adf3916eabc3c8f

  • SHA256

    d5affeb830f4f1126147f09334490d1627ad3a8525b5203470d0bb8187bc4192

  • SHA512

    c0c5d9cb3a49566f4c0a783e128d731fb0ba5aeb7bb39abea88f808cd9d4f55a696ebc055eb1b30623929f13d31c074067aa653ea99cca592ee6329f50fc3eea

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLaBZoW0UyTq5ziFaz:T6QFElP6n+gxmddpMOtEvwDpjwaTqFs

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 74fa8aaef685d31cf11cd2700a366bda_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections