General

  • Target

    50350cff9d86b0fca7e062088361a8d4_cryptolocker_JC.exe

  • Size

    85KB

  • MD5

    50350cff9d86b0fca7e062088361a8d4

  • SHA1

    d44b674f4584f43d6224bce25c2de727af9b8005

  • SHA256

    0a97f7405b8fb0a9d6948ae36237277d81148147d56b11dfc2a18144f49dc2c2

  • SHA512

    602a26cc96508215f24df318656b51379e00e8519c604fe9dba48887da527a83ffcae4905cd219e89ef1431f30db33df5ac8518598dc3933eec9263af1a80e04

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjN:zCsanOtEvwDpjI

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 50350cff9d86b0fca7e062088361a8d4_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections