General

  • Target

    53fc80aa977fbdc49bd957d4c0e06815_cryptolocker_JC.exe

  • Size

    91KB

  • MD5

    53fc80aa977fbdc49bd957d4c0e06815

  • SHA1

    8d1a3b52837124189b5abd6ca08e3b1bf94b6b99

  • SHA256

    4b5ff2eb8edc2a6f3e1a455bee2663d92665889f1f034560cd65469d5e8ee938

  • SHA512

    754a20681236d55e1d4fd94c65ae4be047b1aafcb257012a377d36e60b828d052bd15ebd9aec80e9da2ac907a2f63af26257cfb78b0496022104368e031d5cc9

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5i1:1nK6a+qdOOtEvwDpj7

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 53fc80aa977fbdc49bd957d4c0e06815_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections