General

  • Target

    66cfc1cf6af4c078fcaa92c8707b4851_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    66cfc1cf6af4c078fcaa92c8707b4851

  • SHA1

    029aa32b36c26448be91ac98fcb06729477f56b0

  • SHA256

    04f9185aff6eccc86d1e63b00cf7a8d2162ba662fcf4c3ed9cf400ffdc9e319d

  • SHA512

    b945112ae2c7076048cdaabf0e165ef25f4d9e045d714a5d6226328d505713cf64946d12f8aa12e2c137d7d9d4c634c30c8f76bb974adaea7b304d5151ddb4ab

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6G8:1nK6a+qdOOtEvwDpj8

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 66cfc1cf6af4c078fcaa92c8707b4851_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections