General

  • Target

    5b690d0f54e4037ff46375487323687b_cryptolocker_JC.exe

  • Size

    77KB

  • MD5

    5b690d0f54e4037ff46375487323687b

  • SHA1

    2787a387de86ffeb96bb454fc898af5e1c5cf6bf

  • SHA256

    0c49946444dd2a0d80fe3a929581b3fd4b222e1f80bbbde4106e3bc67c8cb598

  • SHA512

    584f5bd1d175bf9bbc385d8ff81b3c89edc2a34192c9038e39e38e11742160444fd5be303e80712d903eb8cc82064339c690b212ea6de0aafe6bf7549ef33cf3

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSwLJn:1nK6a+qdOOtEvwDpjG

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5b690d0f54e4037ff46375487323687b_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections