General

  • Target

    54a340e3b8a2c7f0ebc0a0b423d969ae_cryptolocker_JC.exe

  • Size

    137KB

  • MD5

    54a340e3b8a2c7f0ebc0a0b423d969ae

  • SHA1

    e63572f7db90a855f708fc6ce7c8d44c371016c4

  • SHA256

    099982eccfe60f6bbede6119ee3ae9c808c754f6217b7468324b6fd441d16e11

  • SHA512

    8a08183e9a85d22976924aa0869c6af7979c64ec154a20bc064acf325c6da7cb1998c08d09dff2290aaae37f5e205b044e2cf8b85adf52935badb1be3cb03cf3

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G/TOe:z6a+CdOOtEvwDpjczU

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 54a340e3b8a2c7f0ebc0a0b423d969ae_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections