General

  • Target

    48b2c1afa29578e9fc7521a89910e683_cryptolocker_JC.exe

  • Size

    54KB

  • MD5

    48b2c1afa29578e9fc7521a89910e683

  • SHA1

    bb7eac941bd7a8033e36bc974790c34f05f20192

  • SHA256

    9314ea5953c5507c7006e8c0ffed8cc016f322b07f0f80cbb82982e99d6bac20

  • SHA512

    9ce0150b824e915bae67dd479c3a6b3ccd538676d3545393aea6befa3ac951a7373a5179795c066ea8fd357f175625f0d682e6956678153026acb1466572013e

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpe7:zj+soPSMOtEvwDpj4yy7

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 48b2c1afa29578e9fc7521a89910e683_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections