General

  • Target

    8b4737a709c9c69cfa6397ce2cc96d51_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    8b4737a709c9c69cfa6397ce2cc96d51

  • SHA1

    cc4bce46c0aaa09c4974bafbf68517fd3024cda3

  • SHA256

    eb80b49152c27448cb3cf4f2c80818891e725241bfbb2321ecd7f6c652d29e85

  • SHA512

    1ac088d3cbecfb67550959c5712e412cd4c706b5e13cdb4d5712ce8181226d59cba76441f78ad7defa2ac4352e3f43072ced9de8e591157a353fa87c62f77b46

  • SSDEEP

    384:z0VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26JWFp4MYkW0NrD5v6ntOOtEvwDpjqIH:zQz7yVEhs9+82MJP6ntOOtEvwDpjF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 8b4737a709c9c69cfa6397ce2cc96d51_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections