General

  • Target

    793e641c0af673277617825edb5916f2_cryptolocker_JC.exe

  • Size

    138KB

  • MD5

    793e641c0af673277617825edb5916f2

  • SHA1

    bf6ecbee6aeb574c57c8164672fa5888641e99f1

  • SHA256

    b77b66a8be0817329217a25a7bc4b49cb381be6f9a6900a4b0d77008d3c3fd30

  • SHA512

    16e6c976bdd45f1671b3efab8d137985f3ebc7a3e4d1d53b8f62af04ba8610c6c993a06451d60f2daa7054c221129034576c3109659b0814d88963524f358e12

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1en:z6a+CdOOtEvwDpjczt

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 793e641c0af673277617825edb5916f2_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections