General

  • Target

    4fc4b94e8c76f8f9ffadfe099c5e75bf_cryptolocker_JC.exe

  • Size

    59KB

  • MD5

    4fc4b94e8c76f8f9ffadfe099c5e75bf

  • SHA1

    afa88e6b84d662c0c803153c613da0390f2bae94

  • SHA256

    e79e0150b1ec54f083f129fac41efa119b1139bc7dd8f668eb64977f955f6895

  • SHA512

    36c863d6b66f1b2e9593105ceeac13b28ff8bb0ce21baf3f7572818d1a162db19122a041cea7a09589ebb6a10c6b2b0b54a6742a46e34adac481c1c2a2c0eb1e

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5aFr7YOzR8+:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAc

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4fc4b94e8c76f8f9ffadfe099c5e75bf_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections