General

  • Target

    48e501697aabee49c450ca77a60fa0c3_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    48e501697aabee49c450ca77a60fa0c3

  • SHA1

    ec6608d7da2b13247a231a8862adc8107546ae19

  • SHA256

    bd333b26c1d3d4783a9af0c67a418fa3687c2e79199365bffb140ce7a8a407df

  • SHA512

    cd33e634395dbd8753a98a05e4d9542663387caa67718b1ae210e44d8bfcff19e7702793738d66478b6647f6007e90a2f5424ac40bc8dcaeb9929825b3efca1c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6G2P:1nK6a+qdOOtEvwDpjM

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 48e501697aabee49c450ca77a60fa0c3_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections