General

  • Target

    5963c6eaeb0d510b4b7e0a778e3f3c64_cryptolocker_JC.exe

  • Size

    68KB

  • MD5

    5963c6eaeb0d510b4b7e0a778e3f3c64

  • SHA1

    54f156289f99838772e92d473a13d25e78d1c33e

  • SHA256

    6e973b5a55a77920f0c84f0635ddda0392690bb176507abbe7a9d9c972be2eaf

  • SHA512

    4db4b14e838a98d3ca562dd814ec2cc670c02655e274bb5b33db8f82302baf8992dd305bc3a70ea10e7a661b8ef2fa33b3f0a72d7401897fffd5619e2c6a19b5

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYfKhBUzIH:1nK6a+qdOOtEvwDpjJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5963c6eaeb0d510b4b7e0a778e3f3c64_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections