General

  • Target

    91947b4fbe62ed0a63d860366ebca6c4_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    91947b4fbe62ed0a63d860366ebca6c4

  • SHA1

    2c762805512028b0583813abe2b8e1638e63cd80

  • SHA256

    6e9d2dad0551317c3962fbaa655defa07c9322edc58e88cbaa6ed895cca29886

  • SHA512

    2b44b7e5e2a9e98e37b1ad0a6531544825dbd309b9d8022f95af44736fc5db4f320b475dbf02e03c2467ecc0a3e61b94b744618a82edaa8b7e68fbe6e8ef01b0

  • SSDEEP

    768:qImnjO6LsoEEeegiZPvEhHSG+g1rum/kLyMro2GtOOtEvwDpj:qImnK6QFElP6n+g1CmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 91947b4fbe62ed0a63d860366ebca6c4_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections