General

  • Target

    552a9351452ea2ae4e8a1e93bea16670_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    552a9351452ea2ae4e8a1e93bea16670

  • SHA1

    d988a46fb229a1693faa3a9ffe1b2225eb5f92aa

  • SHA256

    ac072c8aaf7a81a68d8b13e16fc1269855b59f5862d2c89e5f058fd9bdecda57

  • SHA512

    b18b2c4aa324ba1e096cb13a02f3b14a1fef5871020b4225a5e2e97a5f3d76de488794d850fd2eeaacc34190fe920c58ea9341ab04a56c02027b566e8ea06aa5

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GW+/d:1nK6a+qdOOtEvwDpjd

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 552a9351452ea2ae4e8a1e93bea16670_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections