General

  • Target

    61ce1068bf9b38c93e92840f295414a7_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    61ce1068bf9b38c93e92840f295414a7

  • SHA1

    c1ee22155f542e7183d695cd6d2c5f1ffb9d34b0

  • SHA256

    b5b5e09281efda54edcde1997781f197d9d9adb1b9dfcae6bc4ed856f86aa0fe

  • SHA512

    2baf2bf97b151dd66cdcb05b32c2005b240118159cda1a7b6174cd86c61ffea095426839e384cf0ab565fdcba5a68ba855bfed8f8012a6bcf117b59687438ee2

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gZ+Mum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+gZ+ZmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 61ce1068bf9b38c93e92840f295414a7_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections