General

  • Target

    abaf0d31d0b14356bd511f6001131cff_cryptolocker_JC.exe

  • Size

    108KB

  • MD5

    abaf0d31d0b14356bd511f6001131cff

  • SHA1

    33e0d593430ac032b080a924afc9508ff7b4099b

  • SHA256

    05bc3d3a442cb0433f5b1b27dfed2c1b9053b982b33412957f3c239c2b3b29f5

  • SHA512

    f9c82fd28a8fd1f25a049fdac2d344a9075ba9c01e6f63733b807a18d1d6b18e26cb850054f7e3b7f614558a674e62ce3f17f88ebced03f3a293ee67181a7a3e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp3s:T6a+rdOOtEvwDpjLz5

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • abaf0d31d0b14356bd511f6001131cff_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections