General

  • Target

    5c6384f72bafa60ee6aacf5373d30dfc_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    5c6384f72bafa60ee6aacf5373d30dfc

  • SHA1

    80ffbdc8bc68c2f874004eacd34e8f90354781f2

  • SHA256

    0fc401a70dcddafc7293d7157173b4a64de41d800c6a4303c306fa405bf7ffe0

  • SHA512

    14a6f7f72f97cd89c95b05371a715f89f143ade6ea899fced2608d84622e667ac825f04aa7d711116ed2732052ac2ff6705f1591cdeacb21e5302d8595d4ff63

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GA:1nK6a+qdOOtEvwDpjA

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5c6384f72bafa60ee6aacf5373d30dfc_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections