General

  • Target

    fc41cbfe4bd78c16e47bf73ef0e91e4e_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    fc41cbfe4bd78c16e47bf73ef0e91e4e

  • SHA1

    025ff311de0c75bb2fdcdd209e9df75dcb8184dc

  • SHA256

    2ee8e9a1e0b74fa7895c5ee3278b1a8dd90d0719b89cc529236df98fa0063f45

  • SHA512

    544eb9d25c2c4e16310e81240c1d4d5d46da3e99b24fbb161bad4585c8810c599d5c1896b39993ddeac8e48876f01e68b32d5bd54f0d79e9daeb5cac183a25ce

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gy:1nK6a+qdOOtEvwDpjy

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fc41cbfe4bd78c16e47bf73ef0e91e4e_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections