General

  • Target

    5e628553d72bf74eb0cca0a4555ef3f3_cryptolocker_JC.exe

  • Size

    136KB

  • MD5

    5e628553d72bf74eb0cca0a4555ef3f3

  • SHA1

    aeb9b8aa01851cdae94da2c5e7ae232e05e53dc4

  • SHA256

    0ff0300815a79b2883c933e1be5ec1f0c5603c9019e3f6db38b92d698ba063e6

  • SHA512

    01697667376a5ef0fc567b37b6d0e353ed0a8dcad42628976d117a3d8da3ed08ad621e95375b5a97b4a7ed512b93dac81d068504e58785415873fdf63c30625f

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G/Tt4o:z6a+CdOOtEvwDpjczG

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5e628553d72bf74eb0cca0a4555ef3f3_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections