General

  • Target

    51e940c54e402acbba7c8f3734c1fc34_cryptolocker_JC.exe

  • Size

    50KB

  • MD5

    51e940c54e402acbba7c8f3734c1fc34

  • SHA1

    854ec85294a26d643859da6459ca3bd0cb3ac30f

  • SHA256

    f9d40b43c42f82fe89ddba46d7e7acd6e9b0f27af679040ad1c93f13be31d796

  • SHA512

    7b04c0e2d18ce381ada237ca2efb397f742b2b3ff372a8d4d43904436993a4422854e178d29bda87c9e7b557df4cf46745afb70253ddd831865f998c393128a3

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0Yj:zj+soPSMOtEvwDpj4yS

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 51e940c54e402acbba7c8f3734c1fc34_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections