General

  • Target

    5fb3bf9663b508964f78b4e3f14d6a31_cryptolocker_JC.exe

  • Size

    54KB

  • MD5

    5fb3bf9663b508964f78b4e3f14d6a31

  • SHA1

    eb89022e8c06553b1dd4d56a8f5835769ee0fc4f

  • SHA256

    20cdd43dc7e96b1d48bf98452267813bdd40cca9c46d2a55710bee19aafb73d2

  • SHA512

    73323c269bfe4551139b36cbeae6102e04a1297b961ff2828b105626031a385784f46c460f40489db91f487aa997b682b277a82b66cef96139bc46749cf55c35

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpe6y:zj+soPSMOtEvwDpj4yyB

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5fb3bf9663b508964f78b4e3f14d6a31_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections