General

  • Target

    4fbe661181ed45a5bc7ced328e4a7c89_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    4fbe661181ed45a5bc7ced328e4a7c89

  • SHA1

    2fa258b85dcab75c2c2b38a4da58c7d98182cea1

  • SHA256

    dc7d11fffa018863cffc822a10ef6d79f14339918428332a10574f7602c1d8b8

  • SHA512

    f0a8ce1609bee141e559cb1b537aac97ce7f60f1f4eff936b32df6756cc0c26aca95e6bce367d75f9340582c9e49ac6c505ef33bdef4f4082346f58ba0772cc5

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+g1yum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+g1rmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4fbe661181ed45a5bc7ced328e4a7c89_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections