General

  • Target

    949d5000679886644caebe1cebd2f765_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    949d5000679886644caebe1cebd2f765

  • SHA1

    071f1a3ff379403d748787fdc55d39f17bf399a7

  • SHA256

    df46db9ad855f66555605af84d7d88e7d91ab6dcd65b780df95f9c714654690a

  • SHA512

    57ce59531c7db26f438a0ebd2f4a6e0ccadf44180a88edb3b1bd126fd49385ecee1489ce0fe0932f49f73669f79875248a4638c857157a02d122dec36688f5f1

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gZAMum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+gZAZmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 949d5000679886644caebe1cebd2f765_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections