General

  • Target

    97ef264826020d0097db39b35046b006_cryptolocker_JC.exe

  • Size

    71KB

  • MD5

    97ef264826020d0097db39b35046b006

  • SHA1

    e3064fccc25137855b9a9eb955ec9c730946f9c4

  • SHA256

    7e46c90457d78314fbf7c61e319e59790ccc9f0a88b75312b682a0230b575192

  • SHA512

    3cb8a5bebf4c877b1d6ea9e127a9409f3a8c18d7a39df639f90f94f3f73efe95a1038c32d8d9426c391f150d1f4490441726be00eb2da379a59ece900882726c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalzX26:1nK6a+qdOOtEvwDpjor

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 97ef264826020d0097db39b35046b006_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections