General

  • Target

    e1b07fb05e16e1908c243dc3d6564c96_cryptolocker_JC.exe

  • Size

    80KB

  • MD5

    e1b07fb05e16e1908c243dc3d6564c96

  • SHA1

    8f6ff91867166ee35d6260be1d5871053fbb3dd8

  • SHA256

    04164419ae5ad1e6f1f8b4c3799e4eab600539612cbccf14033f47f554a8cc98

  • SHA512

    5d6448582ae33ee82534e2948504f9af5e118fa99452f34a556ac998d88681bc8514dcc9e25f203d9131274748adbc844bf2aa85360ca9ce11ea7c60405219ac

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwapYTjipvF28:T6a+rdOOtEvwDpjNpYvQd28

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • e1b07fb05e16e1908c243dc3d6564c96_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections