General

  • Target

    4e8ca0bee01e54885ecdd9ef54bce3fd_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    4e8ca0bee01e54885ecdd9ef54bce3fd

  • SHA1

    7e71a715dc446da7fe55540949d412f15f4be2c4

  • SHA256

    8470a3c9c4e53daeca4882df6cd23117434b8cc34a8fc64f962952cdd2301039

  • SHA512

    ebad8cc523e99eee99b67dc53522baefea3106e9618da353467d6c4d2a40a18d7db05ce518852ba4e771054ba091a0ebc6950913ac6a24757be649e6fe1a3fa6

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+g0Wum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+g0PmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4e8ca0bee01e54885ecdd9ef54bce3fd_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections