General

  • Target

    48a99ba4b83326675230fec72bce12eb_cryptolocker_JC.exe

  • Size

    136KB

  • MD5

    48a99ba4b83326675230fec72bce12eb

  • SHA1

    bbd335852cc5c4def0cb36e0f94603f6782c33db

  • SHA256

    563c2f2a72410f7e8d23fa1ea0329887853a1b8c590fd052fb5a1fb1151e6e30

  • SHA512

    e9c9b6bb6dff5a2882471e558482a5bf51a168bdef60e93bfe1551ee89db7bc18837639b464548910d56860636c11acf4d8c4141067ddec2103cb6b8b7a4bd6e

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GjZ0:z6a+CdOOtEvwDpjczX

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 48a99ba4b83326675230fec72bce12eb_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections