General

  • Target

    5a2b23291d74c2353922c0a523f6dd82_cryptolocker_JC.exe

  • Size

    118KB

  • MD5

    5a2b23291d74c2353922c0a523f6dd82

  • SHA1

    534e51bea61033e665a3f5bbabb68ac8a37b1741

  • SHA256

    c9546216bedc7da81e2408d4a3bc1d969da4e1fe9fcd42cec2c37fabc74ddc92

  • SHA512

    2e700a21eebb8b7fc2cd6cb0e3ab90c0907d70743444d07092bcef6b809019f0270e46ca2c1e0c6295633ad1ff0ce60b03efe15a00af5c701543bb45a5292bd2

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpQbCJjV:z6a+CdOOtEvwDpjczK

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5a2b23291d74c2353922c0a523f6dd82_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections