General

  • Target

    668e9ce7a30778f0c9f685f97e7edefe_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    668e9ce7a30778f0c9f685f97e7edefe

  • SHA1

    20c4f14e5c70ac4b4060504327685fd933abef83

  • SHA256

    b7698a12e38a0f0eef189b921214c9c2ae0aaa1b36ba94e4b79367501be7713f

  • SHA512

    c925fab0077b556092aaedc06bba5838570120eed257306f478259844fd9c875df2ea56dd11e3bf86deb8a945849ffa18beeaf0c50466e087a49d10ffa6f7620

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GK:1nK6a+qdOOtEvwDpjK

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 668e9ce7a30778f0c9f685f97e7edefe_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections