General

  • Target

    5942b3c17c689dc73b57a6e7758fafa1_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    5942b3c17c689dc73b57a6e7758fafa1

  • SHA1

    2643579b707319b1b4ecc9ccc813c2f5fb3a2017

  • SHA256

    00f399977243e4e131b4d976201bc0f17d44e8d86647f00375c713a552c4d3fa

  • SHA512

    db6dc8c34862165a7f98499526a435960d84978f84454f8f794cb93bca0472e3fcfa3c03f0dec941a2d0d90316050c98204eb3d75c3b6077b69838ffe97ded53

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GkC:1nK6a+qdOOtEvwDpjF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5942b3c17c689dc73b57a6e7758fafa1_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections