General

  • Target

    848e5c3d92aa2de05cb9d12e9ccbe0fd_cryptolocker_JC.exe

  • Size

    66KB

  • MD5

    848e5c3d92aa2de05cb9d12e9ccbe0fd

  • SHA1

    7400ba6d89bfdd0c087949c3da1549f4c9dcae1b

  • SHA256

    7de9ef009debfbef71b1eed5614c68b7afb7ddf23a0a7025905e3b14c2be6de8

  • SHA512

    b77605dbb177a9b0a2a44458ce2e4167919e983e5bb201732afddb5640f21f94d2146cf765b1175631c1a39df8aabcb6dda8f09fc804c0b770e868d8637ea478

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYfKhBUzy:1nK6a+qdOOtEvwDpj/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 848e5c3d92aa2de05cb9d12e9ccbe0fd_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections