General

  • Target

    27f7827f48c56c17eb2b8757d5bd3250_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    27f7827f48c56c17eb2b8757d5bd3250

  • SHA1

    4fb6377f4d5ebe5b4ac6cc2ba4d279f079fe082e

  • SHA256

    4dc85e0466210d2b16d29d74c8c57278409aab45870f28a3128660d84ecb2d4c

  • SHA512

    4ec37cfa1df231dd3ebbba2a9582d128394bf232d91508660d2b82a2ea000e2bd4d70e70d9af6d315c2844df2078c79faed6ac711ae27ee9419c41757e9a3072

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gGQum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+gGNmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 27f7827f48c56c17eb2b8757d5bd3250_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections