General

  • Target

    4ccff2bb75e8fb33e729b42ecef131f5_cryptolocker_JC.exe

  • Size

    82KB

  • MD5

    4ccff2bb75e8fb33e729b42ecef131f5

  • SHA1

    1d72c8545edf148f836145703fba8706a630cddd

  • SHA256

    d6bbadfcb65df458cda47d8610f504b3614f67be491a66607c4417d57441b519

  • SHA512

    8c97962ebb9022b7b7fbf0534b266cba16e64f8f28f145657ff16351de325c9b13b97bf25562e18955daa55384d62e70deedd19a57b7558a45acbb685b22cc5c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOTFBEa2z:T6a+rdOOtEvwDpjNK

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4ccff2bb75e8fb33e729b42ecef131f5_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections