General

  • Target

    5546a20667862bcd5685845733185892_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    5546a20667862bcd5685845733185892

  • SHA1

    0e55a285feddd2068268d947aa43ea7f271f3778

  • SHA256

    e6674d200ba9f95d4dca6d4d518370702e57689a25b505d45df9deaa7cd0424f

  • SHA512

    7cde1315c0035ed55c329ff87d6c95b6421a88e7a9017964afdb326d2b8d9c72a4b7c1964bc9538f9a52975972bbba5f456a79571dc85e7b31e3834364857b72

  • SSDEEP

    768:qImnjO6LsoEEeegiZPvEhHSG+gXXum/kLyMro2GtOOtEvwDpj:qImnK6QFElP6n+gXemddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5546a20667862bcd5685845733185892_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections