General

  • Target

    979a650e925213b416b41cdcf3f30b54_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    979a650e925213b416b41cdcf3f30b54

  • SHA1

    6daa153cfc2ec30b67fabace5c3163e5f382312c

  • SHA256

    b569ba243be74c8d75a03bc124bc45817ebbafd73d973fc36f6492e76ef54954

  • SHA512

    8378f1523458b3c5c965ea78dbb4bb6f55c2991957b2ee7160818e0e25382d3a47763c5ca820d021fc8def93c80282d4f07ba4dd44ae21075e8ba3f6cf0ad212

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gj06:1nK6a+qdOOtEvwDpjD

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 979a650e925213b416b41cdcf3f30b54_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections