General

  • Target

    b40044b8d3656d380f570643497e0c03_cryptolocker_JC.exe

  • Size

    58KB

  • MD5

    b40044b8d3656d380f570643497e0c03

  • SHA1

    a8e026967b3baff9896e4a74c9b5c5ee86b3f394

  • SHA256

    e8e09f9381072b275d8f5e76defc1ca9a47f060734150106233592a132bcf6a4

  • SHA512

    f08738ba5b935eb16dfb06a8a3bc4e8629ac281f00e973dde97439d4bf20d30bf14f24ea8198da68644f13bd156edd1e2cd41da0f7aee1d0fe7d6de2f6463f44

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLaBZoW0UyTq5ziFaF:T6QFElP6n+gxmddpMOtEvwDpjwaTqFu

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • b40044b8d3656d380f570643497e0c03_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections