General

  • Target

    78739888a40bf23b5c11f77cb40d7e8f_cryptolocker_JC.exe

  • Size

    118KB

  • MD5

    78739888a40bf23b5c11f77cb40d7e8f

  • SHA1

    446a4a6e2fef46c13a45e667c6bde58d50091686

  • SHA256

    3928fb41115c2781d420a26f01702ea6af61acf16555fb84dbbdc08fb5615e9f

  • SHA512

    83b792a9d508f7e695608dfdd7a80b14c6b8bbaf9cebf8a0525949b2e85ea91645fd982fa2b6964a43c20a90f2f07181b28ea41df724c2dc4568eabc9b63115a

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpQbCJjR:z6a+CdOOtEvwDpjczO

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 78739888a40bf23b5c11f77cb40d7e8f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections