General

  • Target

    69980d087dc05ee7eaedf142605ca99a_cryptolocker_JC.exe

  • Size

    137KB

  • MD5

    69980d087dc05ee7eaedf142605ca99a

  • SHA1

    bc4cabe06f98bb60ee069becae9bf5406e32651a

  • SHA256

    813f2908686ccf87a9a9f9d1b42e62e1e231dd72050145f785ee19d1aae8c36f

  • SHA512

    a2c41f52b25871d2d262350628bcefd2452b7ababcd57df9236242d336d394323639a45e91827fd6bf9d60ddc7ecbeae885b93c906d9bf15065684d976166c7c

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699Gjr0x/G:z6a+CdOOtEvwDpjczs

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 69980d087dc05ee7eaedf142605ca99a_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections