General

  • Target

    7c79b4a1621bfcd25e877e8ba6a88be2_cryptolocker_JC.exe

  • Size

    83KB

  • MD5

    7c79b4a1621bfcd25e877e8ba6a88be2

  • SHA1

    bbbb1a17145656162e584ff5a5f409d6b50ba50b

  • SHA256

    7c1f1501fc382bea064aeebbc878fec175c3e55eb1b310eb6ae1193a05a392bd

  • SHA512

    5e2323f9e267796d9bd093b514c2fe56bc021d280d53177ac010900f79fe36e61dc5ebc1d755da046ddc35a09ca17e6e5dc108fca14e49d2ca0603360b500163

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOTzciJjH4az:T6a+rdOOtEvwDpjNws

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 7c79b4a1621bfcd25e877e8ba6a88be2_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections