General

  • Target

    90749b606b978a313b44f95043b4a365_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    90749b606b978a313b44f95043b4a365

  • SHA1

    9e44495a26c3aa6f65f622b5b0e0f1398d1582c9

  • SHA256

    3cda03f004d931966eb7dab0b7f58c94a0ed06524617c421563529e08270c485

  • SHA512

    1207e14d3ae424974203ae8480f98b33b7c6de863c37364480ff998580e0dee6494c76c28b49a57d22e0ac8ebcd6d358c6fe914115b7fdc99120a9b5a8790ae0

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gXDum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+gXamddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 90749b606b978a313b44f95043b4a365_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections