General

  • Target

    570d64438efa1ab7a03ed97c6411fb7d_cryptolocker_JC.exe

  • Size

    59KB

  • MD5

    570d64438efa1ab7a03ed97c6411fb7d

  • SHA1

    7daa4656b5fdcf192537ffd4874cb42a63de777a

  • SHA256

    c8276218f5c7658c5d32f36182df9cc786aa21beff928efb8f93dbcb94c9c7c3

  • SHA512

    647f0ee6d0a55caf449fe0e01f2c032807d96410a79e9f33a3e39003a4e17762b04cc90dc6c053adb55847019e709760f1f9220b3012105e4d557f48a5cfbfe6

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5aFr7YOzR8/:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAB

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 570d64438efa1ab7a03ed97c6411fb7d_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections