General

  • Target

    5a1cf44d177aebb80855cf231e2c25ec_cryptolocker_JC.exe

  • Size

    115KB

  • MD5

    5a1cf44d177aebb80855cf231e2c25ec

  • SHA1

    bcd440faaf738ba01ada9c8054d52693a2340cac

  • SHA256

    f208ad33d84735018046545aa29c9b66dc5f2b7f0f65def4aaa21ffe83bed894

  • SHA512

    e547d728611bbbb33483e2b9c4a7d37c823ebc8386446829f3324a3e27c07f15085f128538c6dc87aa64bc559922a00ad367bbc42e840c082895af5db71e153d

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699G1mC:AnBdOOtEvwDpj6zQ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 5a1cf44d177aebb80855cf231e2c25ec_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections