General

  • Target

    96cb44c4ef5c5ac1a6541b6e7be4451e_cryptolocker_JC.exe

  • Size

    71KB

  • MD5

    96cb44c4ef5c5ac1a6541b6e7be4451e

  • SHA1

    03e721669bf0a5b6e01069fb92244441d1aff47b

  • SHA256

    30ba98f4a2159eb997f518dd5ec639477a916aacb80eadf2a7edec30cad3abe2

  • SHA512

    9f5d61c916c359fe1b8a52d981516c7c1479eef6796fe9c54e7752ee24f1a5f5c5ee79db434c02c6cb8c8ca54868411ff740cb4e4b7a430b847a81f60608fcc5

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTJk5asCZcY:T6a+rdOOtEvwDpjN7

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 96cb44c4ef5c5ac1a6541b6e7be4451e_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections