General

  • Target

    7ed0a5cc5f1ad6d906102845036924a7_cryptolocker_JC.exe

  • Size

    62KB

  • MD5

    7ed0a5cc5f1ad6d906102845036924a7

  • SHA1

    ef00c21d037c0d6651aea44c2cbbfb9a86343aa2

  • SHA256

    49daa156fdb86f0b491871f4df249dca8f36c555a3ea231e76956354281a5fc0

  • SHA512

    59949245813ae3121645d33f134a5e82ba39b33d200e48a26338f79d27c498ec55c7fad2e374d97051f7faee67b2b1e78b7509f14890a097837afa5ddc8efbb5

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHwkFBG:1nK6a+qdOOtEvwDpjF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 7ed0a5cc5f1ad6d906102845036924a7_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections