General

  • Target

    96891f13c11be631f394876242640625_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    96891f13c11be631f394876242640625

  • SHA1

    b75b938c27d401db747be35024707a84ae31e27f

  • SHA256

    71a0d701b6413829e8ebcfb03d5ad2ad3ea5179a28b99726c6aab7bfc96c9ae6

  • SHA512

    9db5aceab1bfb61ff803e535d2333dd4dd790f957961409069e307184fed8009680f19bdc1f0f2c404639494628dcd3208cc0f59d47c8fc9fa62433e5ad47a9a

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GF:1nK6a+qdOOtEvwDpjF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 96891f13c11be631f394876242640625_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections