General

  • Target

    d4efc52874e3b5ce1a5fa1796a59e41f_cryptolocker_JC.exe

  • Size

    57KB

  • MD5

    d4efc52874e3b5ce1a5fa1796a59e41f

  • SHA1

    ee993b47abf4fead9191cf231542a779ae1ebedb

  • SHA256

    43735f4ae218964643b777f7957d1bbbbd8a9973f27c951666f97087179945d7

  • SHA512

    10acdf01cc9b2a323ca672269b1af54faee09dc6cdadea29116152d0a0e33367ca5e4172d661b0c8db2e0b6f101b9804996c76577f47122f247587a0452a9f29

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLaBZoW0UyTq5ziBJ:T6QFElP6n+gxmddpMOtEvwDpjwaTqBJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d4efc52874e3b5ce1a5fa1796a59e41f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections