General

  • Target

    67e4c2e49a4ebf58518300fe6064781a_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    67e4c2e49a4ebf58518300fe6064781a

  • SHA1

    1cbb8d584657fcf457d4704f688601da0f45191b

  • SHA256

    2604cd3bdbdca9232f0d3bc87904dd457a9e781d71bed4ed100ba5aa393ba960

  • SHA512

    ec116ab1efae0b952d74ca9f7448ee155006c7e0ad33da63c95d7e39fb0eff5a726e14cf4fde6f4370670900d25af67a14a3e6893819438f21bfbdcb10316f1b

  • SSDEEP

    384:z0VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26JWFpXMYkW0NrD5v6ntOOtEvwDpjqIH:zQz7yVEhs9+8hMJP6ntOOtEvwDpjF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 67e4c2e49a4ebf58518300fe6064781a_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections