General

  • Target

    63a64aff873b516e03bec66e7b55cb82_cryptolocker_JC.exe

  • Size

    88KB

  • MD5

    63a64aff873b516e03bec66e7b55cb82

  • SHA1

    a4b49bb5133bb4fe409623692e17ef6dbf466612

  • SHA256

    397fc3b562372ec7a0072555946c48a647aa14f880b800a1aa8475b01f32f6f3

  • SHA512

    91475db8ccd352f7c2e3b319d6b910a345b382c47a581eae273616ac966b51d7321adedb666e6c3b8780a08bd33209070f239c79c2fe50a235cdb8f3f2d2af31

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDk:zCsanOtEvwDpj9

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 63a64aff873b516e03bec66e7b55cb82_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections