General

  • Target

    64196c80e91059e8a1a6a2a30b7fe507_cryptolocker_JC.exe

  • Size

    70KB

  • MD5

    64196c80e91059e8a1a6a2a30b7fe507

  • SHA1

    ae75959919c4e54427e5846694309f2f9c5fea5d

  • SHA256

    27246b6bb40bafeb08c73bfaa472571f5a2217c59c5cf6f604ed039b5aa610b1

  • SHA512

    806f2edddaaa96119bf9b95adcdc468112ede03f7350b3c183a83c1f5fb1a7953f9139cc9df674f535cd798bfb863369db0dcee5fb702d07904efa54def6a193

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+L:T6a+rdOOtEvwDpjNV

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 64196c80e91059e8a1a6a2a30b7fe507_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections