General

  • Target

    f82b6cb59c9f3da8d2a15839f0249349_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    f82b6cb59c9f3da8d2a15839f0249349

  • SHA1

    7e7b23b92a281a9eba41d0c9faf8bec5151c8a76

  • SHA256

    ac73aa8cb1763b0becc7826af49bca55813038085edf2222dfb177064da850f1

  • SHA512

    5ca528c3b920c3ab0233ba9abc92123e7fdad4f76ea70201b85cd4b7cf6c4fbb616b1d7528053951a41c005406eedd8452f75f4c27dab5eee6f601ca5fd612b8

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+go9um/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+goomddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f82b6cb59c9f3da8d2a15839f0249349_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections