General

  • Target

    fbbb1faa14e414864c7aa4059a93993a_cryptolocker_JC.exe

  • Size

    82KB

  • MD5

    fbbb1faa14e414864c7aa4059a93993a

  • SHA1

    02cc72762fc415f4e715a4dd9a6087a559b21fa8

  • SHA256

    1e0c1b29ca00d4d6fe73d078ba637a330a3db4358688e21e22134ac650e8457c

  • SHA512

    49fbae03cb183be6779e9a96a4ccf8de9e48e0fa3bf168e26b12c4e5977c3a0961e8ba5006038a82aaa86c74a69e950e9ab00d2a679a25305342f4ce3e4bd00d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOTU:T6a+rdOOtEvwDpjN0

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fbbb1faa14e414864c7aa4059a93993a_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections