General

  • Target

    fe4d4752c3909936c2869e851014a32f_cryptolocker_JC.exe

  • Size

    88KB

  • MD5

    fe4d4752c3909936c2869e851014a32f

  • SHA1

    c25acc42ffa1f46965274d66288a022570e11967

  • SHA256

    60110f48af362ee41e11828ec17f59992f320027a2e27cc1c086e8ebdbd76488

  • SHA512

    58f1f15166c049e6125c3ce8b7357403caa360516bf1a2f4bc4075e2f53f471dcb6071a4eadbd457f9398cd6929958d0c1407b0e9c9da60478809d1ffb76f3af

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDWT7:zCsanOtEvwDpjb

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fe4d4752c3909936c2869e851014a32f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections