General

  • Target

    cb5fcd1f974843c8b93621afe80c33b3_cryptolocker_JC.exe

  • Size

    121KB

  • MD5

    cb5fcd1f974843c8b93621afe80c33b3

  • SHA1

    a631e06f85d63a88ababa1aaa50d688376d8510a

  • SHA256

    06cbd908c490508dafe27e857ec1ee0fb26c2cd5c3240b9cbf38fd4cb3a304d7

  • SHA512

    d4d6bc0890c0154994b3107f5223749ee82ee500a89cf597d6321243271f3f16938acf162d41fdf1fc7d58f3aeece3b2da8834e24fbb6a84fab6eccc03327710

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpQbCJjMcoQ:z6a+CdOOtEvwDpjczS

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • cb5fcd1f974843c8b93621afe80c33b3_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections