General

  • Target

    fe90090e89a5d56de0b5823c8dc5bbd0_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    fe90090e89a5d56de0b5823c8dc5bbd0

  • SHA1

    90b2db1d021052f3863ff1f7a90241b7c690c31a

  • SHA256

    497eb9e98cfdb662d08047d2eced5129f1ebc8562399b6323d1fce37bd0356b8

  • SHA512

    dbacba6797f3e4215a35d0d2d8be25213c4a9fe007a6b4e9391e653d6b2ace4f0a8f31dbbf72ea0483e430a7d8e1cb3bfd26da23f68edd3f9c54f4e311264b36

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gin:1nK6a+qdOOtEvwDpj6

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fe90090e89a5d56de0b5823c8dc5bbd0_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections