General

  • Target

    b09d4c5531f9958804b8e6b1d7fb0374_cryptolocker_JC.exe

  • Size

    61KB

  • MD5

    b09d4c5531f9958804b8e6b1d7fb0374

  • SHA1

    aa00257a68dacb09549cb29674c5429ab981531b

  • SHA256

    ef06c6c54b81ae3811026545aa5642c19e87d137064a82bef1a89a197b3a30e7

  • SHA512

    66c455ca3919b68e89c8aecaa4d8602349b4ebc136d3aa1b54bd93ea871d8c88699cecbc8087ad9db7a2e6803203b0a6d4e50cc93cd5b8d32684d6bd190a9ef9

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLaBZZTSoVHT9:T6QFElP6n+gxmddpMOtEvwDpjwaxTNlh

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • b09d4c5531f9958804b8e6b1d7fb0374_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections