General

  • Target

    48f467dfc28e25f3652c19f99be6a048_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    48f467dfc28e25f3652c19f99be6a048

  • SHA1

    a48ec251aed65d0626bfcf6eb0982b2ef3c3d6f1

  • SHA256

    2a1412b4cd5a1547efadcc9aa9179de54193e7fd3a5dea8622856ad114dfbdaa

  • SHA512

    fc13055fade039943d531bef0b4e0560ef91d7db9e373a156bd86137207a801261314273d5d470d8ab3dd3460caec86ecc5b45f64d73dc96eefcec035709a00a

  • SSDEEP

    768:qgmnjO6LsoEEeegiZPvEhHSG+g0dum/kLyMro2GtOOtEvwDpj:qgmnK6QFElP6n+g0ImddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 48f467dfc28e25f3652c19f99be6a048_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections