General

  • Target

    5752233be2be7f52d0ce2a3cc6852ba4_cryptolocker_JC.exe

  • Size

    84KB

  • MD5

    5752233be2be7f52d0ce2a3cc6852ba4

  • SHA1

    5e69f5016cb56283299c96a9bc6ddd35a770019f

  • SHA256

    7ddb6ad398cc57c80cfa5dece4b9c6bd9f3b06447e859f32975600522c6706f4

  • SHA512

    ccdc4394a428ef04a0e73765cc8bb716eb4351201c9dae53bb1978a14804e95fd1978b558a6034f1918d710601171a3d994904b8bdc1e3411d419d8b86624de8

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUC9J:1nK6a+qdOOtEvwDpjp

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5752233be2be7f52d0ce2a3cc6852ba4_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections