General

  • Target

    8592f8602342cba6a3f36b47c5ccdcb0_cryptolocker_JC.exe

  • Size

    51KB

  • MD5

    8592f8602342cba6a3f36b47c5ccdcb0

  • SHA1

    fbc8207fec7fb040a70883730c9d167a28529ac4

  • SHA256

    21f24d56937459e9ac2f2814130e9f65b62603364d93277a2061a19dcab2e65f

  • SHA512

    6d5c8b4a46387f4841e92926cb47f194bf20b7f9baa657c685ff0e07f985c2e5694831cbdf776f1a65997b2d91b82671c2dddad3e1cc9d36f02a2ccea46f05ba

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxoRngV:P8mnK6QFElP6n+gymddpMOtEvwDpjegV

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 8592f8602342cba6a3f36b47c5ccdcb0_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections