General

  • Target

    5d0f5e64ffbeffd6a6de8f7236840d20_cryptolocker_JC.exe

  • Size

    136KB

  • MD5

    5d0f5e64ffbeffd6a6de8f7236840d20

  • SHA1

    f7c04e7377dea56fe4c7389770d0b57ef339ec45

  • SHA256

    40362a798ebbc78151fb86764cded0df782db28e0df4c8868ee58892c75c4122

  • SHA512

    b3361b997e34cbd19a4c49cf0a9a19f0083d41d64ef09ad60b28257a7d1ead205311e423413c961ef0d85f2a64da6ba8d166137dec7f51f25edd094164905a2f

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G1yT:z6a+CdOOtEvwDpjczrT

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5d0f5e64ffbeffd6a6de8f7236840d20_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections