General

  • Target

    cfff755b4edf0db1df470e17cd42f97a_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    cfff755b4edf0db1df470e17cd42f97a

  • SHA1

    177dbb905f3240ad0d1031896ec5f6e61f59e606

  • SHA256

    feece563f1a0333635ce425c59ed3a41c4c1b34ab8688a6ff8a2e47898d3bfbf

  • SHA512

    9bb5b0fac8f1eb895dadb390370d5e02866dc4a29d901dc02214794df7ee487d62eb2f34e3605c7eb018bdaa9b194a6085ce5626720d2acb3a48ee97af76cc54

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GP:1nK6a+qdOOtEvwDpjP

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • cfff755b4edf0db1df470e17cd42f97a_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections