General

  • Target

    589caa13734c9fcc20c9462d27fbfc79_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    589caa13734c9fcc20c9462d27fbfc79

  • SHA1

    5238be9e306073ece5029b5b20000adcf2de6f29

  • SHA256

    1b9e45a3bd83a1a3f6c2301b6d0b385379b06ad5a3bfdb50bc89a2256fa222d2

  • SHA512

    f5813e8700a7a7f66c63a7fd9a589cafdb1afcf46bc114bf1b203a62fb83219a196588ff26c8d54f01f1225c8036e4e0b0b6a1c8907ec44ea9482deeb5ceabf8

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYXUXQ:1nK6a+qdOOtEvwDpjC

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 589caa13734c9fcc20c9462d27fbfc79_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections