General

  • Target

    8d61289443b211cd1cbb8453dfdae754_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    8d61289443b211cd1cbb8453dfdae754

  • SHA1

    51c78e498b42d66defa944ac76536e0832ecb07c

  • SHA256

    a7001ea2c27070aad5cd64568af2dcab406ca22f31e9bfde916ceea53d40cd53

  • SHA512

    6b9ad2d24b99f239e591ba33bd02424f4cfaaeba2601302bf68ffeeed31b2f1fd815bfef26d258ea5e625cf91def474147e8d5d7b7092a5f6c189b4bec22e35e

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5aFr7YOzzOc:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAM

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 8d61289443b211cd1cbb8453dfdae754_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections