General

  • Target

    b44f5f671e17a3209f3f66502c46b029_cryptolocker_JC.exe

  • Size

    121KB

  • MD5

    b44f5f671e17a3209f3f66502c46b029

  • SHA1

    48066a0bb11a111ee441f3f186a244c2bd56b121

  • SHA256

    12d9877e76475a953ca268ccf6bba7a1324c383835664a8fcc9c2b71f13001da

  • SHA512

    6da42b1251b32ceb9dd6dfbe002ae62298eeede58d5b562d3bf6a1720d55f18da7d65bb62f1ed53bb5cc8fbca0ab6fa531a8f6d2b010ef943094826e564f6818

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpQbCJhJ:z6a+CdOOtEvwDpjcz4

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • b44f5f671e17a3209f3f66502c46b029_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections