General

  • Target

    62ed5a2c16f2c040379f834c35f4b802_cryptolocker_JC.exe

  • Size

    138KB

  • MD5

    62ed5a2c16f2c040379f834c35f4b802

  • SHA1

    70692e2a099c99e6ffa225bee8860b24576fc031

  • SHA256

    52bfc24dbf43ff5498e4f1f71dadc5cfde62ca3ee0224e8b66bb2f348eb463c9

  • SHA512

    dbd6bd21ab6f2eacec3e826cb2e0a9f1dce15ca28d700b8fdf52f7c90a0a6cd7d7a6dcb35a53af0886f8a0f40dca80e4b10048719d0d1a722fcaed40c657be62

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1eT:z6a+CdOOtEvwDpjczp

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 62ed5a2c16f2c040379f834c35f4b802_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections