General

  • Target

    8c685034968efa12c8bc991e792a0b99_cryptolocker_JC.exe

  • Size

    59KB

  • MD5

    8c685034968efa12c8bc991e792a0b99

  • SHA1

    8921c21b4acd5c96daff9c25ca2e67a18b3ba6aa

  • SHA256

    49bc292b0c900152fb5f3a930d1defc11954bdbb5112bb092520efec913270a9

  • SHA512

    b776c636f46f55c51384cfb32de7326e7e85bd86d814da8ab721bacd973560d88d14874dcce7d9ebbd39b0f2b0f0612c38985fa9bd9fa2c8b5d7000cb36d8261

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5aFr7YOzR8k:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAm

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 8c685034968efa12c8bc991e792a0b99_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections