General

  • Target

    5fb048d4b262640ae52df68292b663bc_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    5fb048d4b262640ae52df68292b663bc

  • SHA1

    68ea08acde51a2b646370c0f25671455f3cd127f

  • SHA256

    06d28210b3eaa4728a8dbb3ab006042322b6dc9edfd2b39bbf7d0a39a79e77ba

  • SHA512

    f07fd59321b98fcad3dad7a9c3f0f261551b7d98b4b921d07e34a5a69b741712031834439fc2e0e369cfdf6ff605db560f988c4d7b3ee48e22a6172d23ab894a

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gk6:1nK6a+qdOOtEvwDpjt

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5fb048d4b262640ae52df68292b663bc_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections