General

  • Target

    7f64c7e7c7521a8404d438bb166afd3c_cryptolocker_JC.exe

  • Size

    77KB

  • MD5

    7f64c7e7c7521a8404d438bb166afd3c

  • SHA1

    d7f94e11b8c456ca3bee8c38835ffde84a7bb460

  • SHA256

    384405c4f755505368bc117e7be0120d93c1102bc41d19ac860fd5ba4a1d1b0e

  • SHA512

    965bbc76a31909892c1065041bcb14c07716c8f3f48ddcfd739f8ff7bbe8791ca6e2d9e34f020a4592b8ef2cf789771b7338873adf63b36f09bc1828bd310beb

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSwLJ8:1nK6a+qdOOtEvwDpj5

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 7f64c7e7c7521a8404d438bb166afd3c_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections