General

  • Target

    5e9779d2f5d4d5a4495277e3cd9df9c9_cryptolocker_JC.exe

  • Size

    100KB

  • MD5

    5e9779d2f5d4d5a4495277e3cd9df9c9

  • SHA1

    860f70e36abab86db3bcd975360c518d396f8fa9

  • SHA256

    96b6009e997b7b3fd3f1634e8a7eabef429e88d802a18ee1f40f1d1799405613

  • SHA512

    b69caf41d9e055e7a049c78db6bf9f69b2320336dd1e85731e4afaabbe37e07fe429d90d17d70209e4ba5a6fc1ef19b4021903d2bfa4ba428d34d7a7680e7726

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn58+55:1nK6a+qdOOtEvwDpjA

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5e9779d2f5d4d5a4495277e3cd9df9c9_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections