General

  • Target

    ff554277c87963be09489e59a6d83eda_cryptolocker_JC.exe

  • Size

    117KB

  • MD5

    ff554277c87963be09489e59a6d83eda

  • SHA1

    2c9f03da33e86e2390f771a0feb9c7332a99942e

  • SHA256

    dd52ac4a3f0da04db19cab62972f0d8552dc5057dc1d560785b2a527dcdf24fe

  • SHA512

    433d7c6226817f4d3df9fccf04b5e4806c66053ecaacf8b699dfd8481362c46b0be0d99558ebc992dc9d04651fd577c2554243cc9f3495faa3bb98ebe8d124bf

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpQb6A:z6a+CdOOtEvwDpjczh

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ff554277c87963be09489e59a6d83eda_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections