General

  • Target

    b50ff72e5f0b195750e472850fd69f7d_cryptolocker_JC.exe

  • Size

    80KB

  • MD5

    b50ff72e5f0b195750e472850fd69f7d

  • SHA1

    4d0f8f69ab48a1daea8d7a36cd316290c27b888f

  • SHA256

    c4e59e47f8f710308fddfd47c252997e0854814fa6d3ee9eef3eaf2231ea9a63

  • SHA512

    40f5f06415aa4d440d695e7c3e46ecfd52a6c086ebcb7e79b5d72371060c54b44bcc3c99f9aceb841eaba731e50f55a5ce1edb5f986a94c3af0e8a2b62fe3f27

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwapYTjipvF2/:T6a+rdOOtEvwDpjNpYvQd2/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • b50ff72e5f0b195750e472850fd69f7d_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections