General

  • Target

    fce922e262ed92d335b4d4f8fff09fa4_cryptolocker_JC.exe

  • Size

    118KB

  • MD5

    fce922e262ed92d335b4d4f8fff09fa4

  • SHA1

    efc5c2a9df2f91740b463c8e0589426ce0fe893f

  • SHA256

    e04cb2e7fbaa7dba514849aaefbaed953258c11c7b0a4a203835394d32cc1bc3

  • SHA512

    821019a771d547a935d093cb8bad0681686003934a30825ac1c27228d71ae0602182e12c21b9b79825c8634170b4141c0bdd824dffe88ee0ad7cdcbce7780c33

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpQb6R:z6a+CdOOtEvwDpjcz4

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fce922e262ed92d335b4d4f8fff09fa4_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections