General

  • Target

    5a4b9d4731db3c8a5566aa2e4e130858_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    5a4b9d4731db3c8a5566aa2e4e130858

  • SHA1

    33f7bf1610c13246376a8cf6c4ee31b914d1d27f

  • SHA256

    c9168015cf0f948f9f8d5035356ad7dacc4faa78826045926ff0a6ae7e926bba

  • SHA512

    685a54c18fcb80793ac2c1b2de4677236e14c0a889d3d7e34612340a2b3e2e2f75bdd432418a08f697442d40b0b160c6f7e5384d098a416394295646ee501d36

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GNI:1nK6a+qdOOtEvwDpjm

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5a4b9d4731db3c8a5566aa2e4e130858_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections