General

  • Target

    7e80f99a922bf7d4a857c569528919c8_cryptolocker_JC.exe

  • Size

    79KB

  • MD5

    7e80f99a922bf7d4a857c569528919c8

  • SHA1

    5c2c6d5a5e50144d757e5a7be4c18ef07d45313e

  • SHA256

    c5b49394d52901269515d476dd8bb66bb2f9a83de6ba5d6f5ab89df0293bfa1f

  • SHA512

    66ef21e8334f57d20720fcae48c61fb38fa0ef2042739f71697f153b7ebb5da85c510fe3e45076bb0e10d9f2795e8b16dc6e2697bc9a40c934001014f33326b8

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnU5Gz:1nK6a+qdOOtEvwDpjr

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 7e80f99a922bf7d4a857c569528919c8_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections