General

  • Target

    68cb2d5bb23fc2342262b0a17641db09_cryptolocker_JC.exe

  • Size

    61KB

  • MD5

    68cb2d5bb23fc2342262b0a17641db09

  • SHA1

    d85dacf760b7af6065395a3c31d472d4256fdf39

  • SHA256

    fa50aa6811001122e2a6cf6daa9ff3eedf6c0239b70f83058bb7f76493d6320c

  • SHA512

    6542a93dba415265386d27f5b58ba1d890884eea644854cebf095ac99a6a47682021a936b3d46a7293848b90c64a276a2aeb45678d39ab948be3ddc82d8cc4f6

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYfKhtP5:1nK6a+qdOOtEvwDpjL

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 68cb2d5bb23fc2342262b0a17641db09_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections