General

  • Target

    f998c4cbce759b83069f558a3ed42c91_cryptolocker_JC.exe

  • Size

    88KB

  • MD5

    f998c4cbce759b83069f558a3ed42c91

  • SHA1

    f2c4f44abca7c4d21e0998b5599d9d7bbc71f2b8

  • SHA256

    a19bde8d6f2c7498685283fd68519f930b9e576cdd2a5334d5ad72c5f2bd9ebe

  • SHA512

    85f98700c2102a027c3d23bb328b4a153a14b1056a7c37178aeb99310441def1ab3a481e726a8bbbf80b1883bda47c87739a8a65214e0595693f92ca397b760c

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDk:zCsanOtEvwDpjl

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f998c4cbce759b83069f558a3ed42c91_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections