General

  • Target

    cfa1525690759fcbf4c01429dc1e05cc_cryptolocker_JC.exe

  • Size

    80KB

  • MD5

    cfa1525690759fcbf4c01429dc1e05cc

  • SHA1

    409882ff9582b7793f64016b7917b85a0a8acce7

  • SHA256

    31b74bf9a4f401692c7ab1f86e2a55719e388124fcb861e7496faf848456d0ba

  • SHA512

    8e8a06f1dfd3aecfcd53dc1d222b514c58e0201cdb01a57843f637af40901ffd3547a07b54bc47a7c6bd26ef90133d090a874aba1b29ba977e6b4ba18b396e40

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwapYTjipvF2D:T6a+rdOOtEvwDpjNpYvQd2D

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • cfa1525690759fcbf4c01429dc1e05cc_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections