General

  • Target

    910c3e5a0ab66d0949bdd18abe72d6c9_cryptolocker_JC.exe

  • Size

    54KB

  • MD5

    910c3e5a0ab66d0949bdd18abe72d6c9

  • SHA1

    bdd12b06b9feba7d1680bd1380392a71345178c0

  • SHA256

    74123aa52353d76714ab594abb842e5b1998a2f42f13e606aa2c0cf9f1a91a19

  • SHA512

    c48e6a9062931af8e1859cb025d9eb02ffb6c92be8ae97ecfb1576c98536e96047396ffe52f62dc54706233f5ec38655df3cf8eed00700bf82ee0c192cd91f62

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpe6v:zj+soPSMOtEvwDpj4yyY

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 910c3e5a0ab66d0949bdd18abe72d6c9_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections