General

  • Target

    662ba277d9a639d651902132dfe10a59_cryptolocker_JC.exe

  • Size

    77KB

  • MD5

    662ba277d9a639d651902132dfe10a59

  • SHA1

    eb9d5a09c3f7a7e69d9d16b61996f513c753b40a

  • SHA256

    d2cf4135cc0a312229b24936b4bcac3c1ddc8e6d1913dc21e3d3641c7e94f158

  • SHA512

    ec5488dc83e257f17e2e674e67321de0d48a40c7d35c9b495436bad322b0572170ccfd778cdf333a4364919251a1d5fdc0e510c1872dba80040d9e9ef6fff862

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUK:1nK6a+qdOOtEvwDpjN

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 662ba277d9a639d651902132dfe10a59_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections