General

  • Target

    5152985bdfa3714f57564a6bc6a034f0_cryptolocker_JC.exe

  • Size

    80KB

  • MD5

    5152985bdfa3714f57564a6bc6a034f0

  • SHA1

    337b7a67ca5e8b30ddfe60bd35def537852a59dd

  • SHA256

    55defbc2dbddf0d5acc43d67eee33cdc406912f3b89585625d03a6b12202d79a

  • SHA512

    1b3a6d27486bf5a35a1c2d5b7f30b17c14c1e27d91beb3d4622b950645aecb48ca1d6d3cf5230e70b6aafa967d0279dc5acc3aac74561d60e7d5197665118c32

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnU5Gj:1nK6a+qdOOtEvwDpjb

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5152985bdfa3714f57564a6bc6a034f0_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections