General

  • Target

    8a141add294210ab03fd3b02143c63af_cryptolocker_JC.exe

  • Size

    61KB

  • MD5

    8a141add294210ab03fd3b02143c63af

  • SHA1

    37ba485c7fa3e3b9ecf259b5d48d4173faa36b8a

  • SHA256

    e31ca885dbc40d9bf5f75c6dea299573c8f965bbee4e3b9709ae94128116d001

  • SHA512

    9ce7013dd65b6b40101442e902a664a806e0bf9e3ddfaee008b16a6df20171c39be91d38ad3057cdbb29ac8de9792322ade252138cbbb5885af8b28e3c9a0005

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYXUXojZB:1nK6a+qdOOtEvwDpjG

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 8a141add294210ab03fd3b02143c63af_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections