General

  • Target

    a68a898255b3b1cd8ecbcc4183850433_cryptolocker_JC.exe

  • Size

    140KB

  • MD5

    a68a898255b3b1cd8ecbcc4183850433

  • SHA1

    e74a51875cfca2a86e448763699e3fb2dca692f9

  • SHA256

    11f1f00c137e95049a2fa249b4747852ec5c441ed278b25bdaa3f634e8f945aa

  • SHA512

    605986e7b67df97149e3b844567780e62381ff452cf75c49b6c011c25e2d6d1c2f2464c601d2d19453435a6f725d7abee8142de8b792836e34cb3f152b6f62e3

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1evYL:z6a+CdOOtEvwDpjczC

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a68a898255b3b1cd8ecbcc4183850433_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections