General

  • Target

    d16eb817c5b5a7bd572a812766148e40_cryptolocker_JC.exe

  • Size

    139KB

  • MD5

    d16eb817c5b5a7bd572a812766148e40

  • SHA1

    a4cea9de34f3fde0746135c1f806f663d28283a4

  • SHA256

    14ae0007cb8ef391ac82ebb691fd1785c388ecfe03b15c9f8d6539152305f65d

  • SHA512

    9de053810dc587181f214a0fcd93906a5b2b7970ce3338b8267d60f0015ddfd8db401105ad59eb0dfb2e755228b077bdb7ec7cc070de4f0e14af60bc5113140b

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GX2fK:z6a+CdOOtEvwDpjczO

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d16eb817c5b5a7bd572a812766148e40_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections