General

  • Target

    770e22b7dbcb8149e119feecb615e889_cryptolocker_JC.exe

  • Size

    58KB

  • MD5

    770e22b7dbcb8149e119feecb615e889

  • SHA1

    ba5c45e08c9669f7f8f48088d654b990eeeba3c7

  • SHA256

    fdf4c50f3dac6af7efa1ba9b04093a4bccaa735e2ed989fa7f13cdd70c93ff48

  • SHA512

    97ad5710a03661a6b2394403f469822276219f9d716abdc4399398a100e0486b7db624f5adadd94edbe75445d77eb15fd9d19ad68e08746ef3e74eee8dc9435a

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYX6O:1nK6a+qdOOtEvwDpjW

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 770e22b7dbcb8149e119feecb615e889_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections