General

  • Target

    f898fa0f4f64f74dfa7d448b25c03647_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    f898fa0f4f64f74dfa7d448b25c03647

  • SHA1

    d53165de61793456559942c8fb419ef1d13232e1

  • SHA256

    d248355e714846431bc9f3c443a48c9ef7126af898a471a853d812d4b0f7d14d

  • SHA512

    4178f9bd2b627eca47b4b44aa7b400f2c45c80654f6cfa8133d6d8d07823554726273547311614596f83ad8c1a156f66c0488bcecce38f771b3016904ad62923

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAlmK:z6a+CdOOtEvwDpjQg

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f898fa0f4f64f74dfa7d448b25c03647_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections