General

  • Target

    5412d8606526b3fe13c3daddd20f8932_cryptolocker_JC.exe

  • Size

    85KB

  • MD5

    5412d8606526b3fe13c3daddd20f8932

  • SHA1

    8e69d391382cace3a36d184819feac3d31292a67

  • SHA256

    18b33dc8fc8b61a076f727d6ed75a59151d04e7302750617ce3711be28f8ec31

  • SHA512

    e33554c3c21aaccd9bbc84e5122a722712295c693934e0dd3449da048f5b917db5d8291a5a913548ec4b19c7ee6072e3240396cf87065233a371feb83863d69a

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjO:zCsanOtEvwDpjH

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5412d8606526b3fe13c3daddd20f8932_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections