General

  • Target

    a4690ffacd2b2b075c0cb2d12c259b88_cryptolocker_JC.exe

  • Size

    93KB

  • MD5

    a4690ffacd2b2b075c0cb2d12c259b88

  • SHA1

    f32a1a3413b1dab34c5051b2b382a8232ad57cc6

  • SHA256

    91d9b0c3f71bef387d0d5bf49fb89fc30e492dbaacf705723d710d415bf85381

  • SHA512

    dc79217b12e575fed4d07939aad03f7030530a8a69e8a1f88b6ab2b670e473629941598681304e33f3e56afe60e9a23b301215f49ab939057cdb9f41482f5053

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuvn:zCsanOtEvwDpjv

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a4690ffacd2b2b075c0cb2d12c259b88_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections