General

  • Target

    5af51643dd5711cf8c7cba46ecfd3849_cryptolocker_JC.exe

  • Size

    79KB

  • MD5

    5af51643dd5711cf8c7cba46ecfd3849

  • SHA1

    d7a79a30f7757216a45580990e4bc4cede5e98cc

  • SHA256

    80c70540d36be13bff1a111785d2692ef9f8d4f079b83456becfdfe720e3476b

  • SHA512

    c869bb16b76656f92e67aa69369ad58f017f0d72dc6475286b383ebf4259e01a6cedf4369cf5e57a525131693c051b6973c188f8384065b1f231925ebc167e5b

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUXQaOKTOv2:T6a+rdOOtEvwDpjNo

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5af51643dd5711cf8c7cba46ecfd3849_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections