General

  • Target

    61c207e7bce4665c6d57fcd1af0f5167_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    61c207e7bce4665c6d57fcd1af0f5167

  • SHA1

    62089ec753770c339bffcb9c187f6dec7138ca87

  • SHA256

    ef5ebc8c0fef05bd4812d43961a038ee5a8f5e83550ffe181d2521e7a748505a

  • SHA512

    d04617512db45577c0a02f00e73db889ce3c6f1ac15d205fc063b82c34440e2e7ec2652567d4ff9be4fc8dc0bfcf712ef72a40120ff44d0af08a811f9c121f6e

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gkf:1nK6a+qdOOtEvwDpjc

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 61c207e7bce4665c6d57fcd1af0f5167_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections