General

  • Target

    5f66b68abff2d7ceb36a48371d7e2ffa_cryptolocker_JC.exe

  • Size

    61KB

  • MD5

    5f66b68abff2d7ceb36a48371d7e2ffa

  • SHA1

    2ecb72bb5f54f70af3d7a040103a00839503d5af

  • SHA256

    41f48f85b6c53e95c7e825f6cc137f6a22531b76e26660a826d3300af40d2e14

  • SHA512

    c9bbf6b72377a7f49ca4598943894ae8f8231aaa30e4b0511ca0ccb2a39dead6d121cf7e46280003f801f03be6bc966fd0b2b3735760750917263948672a68f3

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAh5z:z6a+CdOOtEvwDpjQ0

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5f66b68abff2d7ceb36a48371d7e2ffa_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections