General

  • Target

    5b29f53c54f5e65d76d11bb07a154144_cryptolocker_JC.exe

  • Size

    77KB

  • MD5

    5b29f53c54f5e65d76d11bb07a154144

  • SHA1

    7d42909cc0fd6a729f973cf0f51b44e7f3ebbab3

  • SHA256

    21c5475e597d1ddb1b2a8febbe7dd5d85ab2df2df5c813d3813b761797368f15

  • SHA512

    3399c27e7450aa2580fe2545e024f5105777b4d037aeb5bba18feb282619e49b7d1064e4877893d0d7685c1617a7301e709e8e6226a62cd5cdb4b200363dcfd9

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSwLJ3:1nK6a+qdOOtEvwDpje

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5b29f53c54f5e65d76d11bb07a154144_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections