General

  • Target

    54980a93421a70234e49bb8e1182b85f_cryptolocker_JC.exe

  • Size

    84KB

  • MD5

    54980a93421a70234e49bb8e1182b85f

  • SHA1

    afd5eda94ea9c509132dfa9929d616916d1e2bd6

  • SHA256

    a75104cb9f6ef39a04fdd50a29245ead18393b10bc327e3e84cd9f6053a5cd01

  • SHA512

    ed1198dddbecdd22073ff1693bf6ce6c1ef0c1f1eecce3428ff7fc6df16ecbb56643e2e27e13f433d51b8c8921fa1390d1dc7f7acb3f2f6f5e6237b5d35e5bc9

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNuj2qc:AnBdOOtEvwDpj6zj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 54980a93421a70234e49bb8e1182b85f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections