General

  • Target

    63fb959d6878fae9ef268e4b97eb780f_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    63fb959d6878fae9ef268e4b97eb780f

  • SHA1

    ee7205b37ddd26773e2a30bab97deebdca9a9331

  • SHA256

    d93c5980762602ea79a4cd9b29f009587f2d58940ba20e3d7a70b2a7255be82f

  • SHA512

    82f93e945d0effac4db2372b8c5db8797537b2e6d37a62d489bf91a89e656172e0dfe1f29f84d9995c90ecbeb4362a2c0efc3fc9887208f98f49c69bfcb2894b

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gk4:1nK6a+qdOOtEvwDpjT

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 63fb959d6878fae9ef268e4b97eb780f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections