General

  • Target

    5a22ff9a5bd5794bff439ab55a8ac17f_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    5a22ff9a5bd5794bff439ab55a8ac17f

  • SHA1

    a32e20ec47d75af5f9a9ff12596560fb0d5e046d

  • SHA256

    b9e0f8a25a9fd20eb74ba0242aa2195690c5152869cc8daaec72ebc1eed795e1

  • SHA512

    6e761e69f18651abcd989d9b24c13c17c07122982cd97f47b84736d08165259b15a7739bebbaa5fef79b21ef0c8ff2ae275bd163b294ec528a877913bef2ccfc

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GQl:1nK6a+qdOOtEvwDpj4

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5a22ff9a5bd5794bff439ab55a8ac17f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections