General

  • Target

    64a602db3b085d498cd090c281ecdb00_cryptolocker_JC.exe

  • Size

    61KB

  • MD5

    64a602db3b085d498cd090c281ecdb00

  • SHA1

    b71e962fd59fb7ea94f10a94880db134ce7ff2d7

  • SHA256

    5e8e75c47d42782d5404fe0a47f6990848990f2df47a946e86ed3d47b745b5da

  • SHA512

    98ad61f15355e51fc58b34b80ed85909e3a3e22b1dae56770318fdf5c74da287a5f412bf7ed0147f07819cba2cb4a8d77b583b097d344a7569a49117f896cbaa

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5aFr7YOv:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAu

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 64a602db3b085d498cd090c281ecdb00_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections