General

  • Target

    5a177443ab722b63ab1313ff24340f74_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    5a177443ab722b63ab1313ff24340f74

  • SHA1

    8238e0b14e9c675fa5dc040603e5034cd43e7f61

  • SHA256

    b91dd2a5671ea3242e39eea2d4cc4b4dacd30de1e66f7b4551056ac4cb004791

  • SHA512

    46ab4fbeed8b66165c7d8788ab685221fe5c097178d89c1e0ce15750016969e44c8b843275110513293bdee04d759b95757f2c3884ff4080d557b795a85ff7a0

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbMum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+gbZmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5a177443ab722b63ab1313ff24340f74_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections