General

  • Target

    51a934ce067755129015f0cd2f4300c0_cryptolocker_JC.exe

  • Size

    67KB

  • MD5

    51a934ce067755129015f0cd2f4300c0

  • SHA1

    49e1df658f34a07b0b71d53274fc510ec170b7c0

  • SHA256

    953c748845c1ad1752d7a7d968180428e195c4e31eb16063189c3729444d763f

  • SHA512

    b0cbcfe211f52caf17d1dc7bb452e48f4aa05eae6178ddef9c73f22f920594e8276a0c090aa331544e328ebdee5c55e1504f49d3f3ffa5de0a1a18a15fcd8a14

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYfKhBUzh:1nK6a+qdOOtEvwDpjQ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 51a934ce067755129015f0cd2f4300c0_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections