General

  • Target

    1fbe264c46c00b10f1790ec0855c7954_cryptolocker_JC.exe

  • Size

    70KB

  • MD5

    1fbe264c46c00b10f1790ec0855c7954

  • SHA1

    3b91ca3ac12cde90467ecc8a321005d9be789728

  • SHA256

    fce6bc38767aaec7be9ed929c9e05c849e529813fae3fb12f93245736ff2618c

  • SHA512

    4382301727fc4e0f7528f641e17f19361c06cd975291ba58439b2cc4b85a23290dafda76665b760446e3e2cf7df3686ed0a826aa38173a16e496f2b49573ec94

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7pBlqrr1HBJooSeKzu1adyBT:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1fbe264c46c00b10f1790ec0855c7954_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections