General

  • Target

    a1c63b2c1eba9dafc905d8683379bb0d_cryptolocker_JC.exe

  • Size

    88KB

  • MD5

    a1c63b2c1eba9dafc905d8683379bb0d

  • SHA1

    0ec422062498868eb9a443014d02ec1e02a8ea52

  • SHA256

    96410ec503bff94fe7734e58f6cfa5b0adfcba94c089f0ee23f23df4d6e05201

  • SHA512

    fe4668e231f72b182e9bb3d0f9bde9fda9aecbcc895994a9d3af4b193bcc576fe2ed8739d5e06e6b91dc71a31839fbd42d0a3a6faca61ebe278ca8ddddae470e

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDWK:zCsanOtEvwDpj2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a1c63b2c1eba9dafc905d8683379bb0d_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections