General

  • Target

    cf3f70561202d4dafbd3676a5edb6d4f_cryptolocker_JC.exe

  • Size

    117KB

  • MD5

    cf3f70561202d4dafbd3676a5edb6d4f

  • SHA1

    f4a5a6aeffd2e5f2049b0956b38923e49d4e7b51

  • SHA256

    4af4f3f1ea490a0273d964a7e3b1d6eb7ce2f5d3e22edf48efad2f754fbc36fa

  • SHA512

    8f0070d482149a8e845ff9f8ce4b2a28b90dce6b0d46854af99f5c1fc26cb706bc06410c90e1b96e566a28704509ece3f0759f3a90838543dad02ebe6eecf85f

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpQbCJhk:z6a+CdOOtEvwDpjcz9

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • cf3f70561202d4dafbd3676a5edb6d4f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections