General

  • Target

    f8d48d99eb4206f10d6b8fa6a75690b5_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    f8d48d99eb4206f10d6b8fa6a75690b5

  • SHA1

    69ef3b42fe8ca608f893e83d4a9b849a3000db69

  • SHA256

    12b5d021c4270be7acd30bbef9af26711f6dbe5df306ddc6281fe8ddf34b0094

  • SHA512

    c9b03f279ea2273c30510a6a6eaf7f7aa1616a5afb119244b4e2677eac486c03cf67fe7e4d774ed3b1c702831ac155643cdfdc4c34330e4b2ab5184e434e5eeb

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gowum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+gotmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f8d48d99eb4206f10d6b8fa6a75690b5_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections