General

  • Target

    654acbe52f7ffa5abe18e8d88b752851_cryptolocker_JC.exe

  • Size

    136KB

  • MD5

    654acbe52f7ffa5abe18e8d88b752851

  • SHA1

    9d44a7f849b67c529d34fa9cf7d63e14412bc80b

  • SHA256

    d575a4f0b3809ddb6849c90fbc433445b2aa3012bb80d35d50c75c6f758965a6

  • SHA512

    13bbc493a19b694b3f8e55507a6a90a51de5c2c2798304b2e1e3a24da059b0bec161a2cfeb3661bf5a4db10aa736454ae3ee45f3f21e488b3ebc021acdd1cc64

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G/Tt1f:z6a+CdOOtEvwDpjcz2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 654acbe52f7ffa5abe18e8d88b752851_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections