General

  • Target

    992e72a96f294def88341089c30a1192_cryptolocker_JC.exe

  • Size

    51KB

  • MD5

    992e72a96f294def88341089c30a1192

  • SHA1

    7c91c6a5e0a1d2be3ba313c8fd1f8a5ddfb3af67

  • SHA256

    e2ae31b56b60fed6d391e9f7483114a3e532f4f0e3b469bef9bcbc1abd2b9517

  • SHA512

    968f8fc0a55879609a5b5119c5c5e5ce7d6809e13884543c22918da6a6c558581601838be52eb6ebc1f6a2b0053a72d8b8233323df1deba27eae35d2afeebd11

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxoRngI:P8mnK6QFElP6n+gymddpMOtEvwDpjegI

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 992e72a96f294def88341089c30a1192_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections