General

  • Target

    0af51e6a3152e47760f43082dd884e91_cryptolocker_JC.exe

  • Size

    58KB

  • MD5

    0af51e6a3152e47760f43082dd884e91

  • SHA1

    2b61f29b2a8d6fabbd69305cdac4ea160fb34806

  • SHA256

    93977eabda6e7c345186009878f5ae72858ba5d346802a4b56d022f89022d835

  • SHA512

    771b91df9edc1704d8dbb0dce7f5f0d8e0fc619317800e6634eb21639bb071d07437e73c1134682d0dc60db903f70fa46187b167ec04fc4417e25f76b0ca7904

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLaBZoW0UyTq5ziFad:T6QFElP6n+gxmddpMOtEvwDpjwaTqFG

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0af51e6a3152e47760f43082dd884e91_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections