General

  • Target

    5a040d9588b411f99eca8a83ab80473d_cryptolocker_JC.exe

  • Size

    58KB

  • MD5

    5a040d9588b411f99eca8a83ab80473d

  • SHA1

    4b100e03fc11b52fc4975f19b5e76000c57d6b67

  • SHA256

    7e22ef71acad5583985a3c916382d43f70b7e7c27e8cef4d6fb279b094d3c4b0

  • SHA512

    6aa47d550fd0a57f6d2a69a7d5f7011a1accee7b4a9e249e55646be08157b2a938f6c89b6144668f0108ce9a32461a9ee7edeaebdae658147f29094d6ba398af

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5aFr7YOzR8U:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAG

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5a040d9588b411f99eca8a83ab80473d_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections