General

  • Target

    dca9aced6c920c1277b8c0798de56d55_cryptolocker_JC.exe

  • Size

    94KB

  • MD5

    dca9aced6c920c1277b8c0798de56d55

  • SHA1

    c134ea6884050396eeb8273f5f9ad11ac4151994

  • SHA256

    25a68994327ffb8d24d18929b10fa6eb4ce36ec77661ceddfc826bb80dd24cbc

  • SHA512

    b77568989c4e6a54e9ca420fe223352ee1f2fa575fa1a9a31c3205a6b56dce78e68227134bc146566d084e2c19cbda4b8e7a35f93db50b7506952d5f9e71f349

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuv2:zCsanOtEvwDpju

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • dca9aced6c920c1277b8c0798de56d55_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections