General

  • Target

    54e7f16c289298e8183b50572254ee90_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    54e7f16c289298e8183b50572254ee90

  • SHA1

    0e5837b400d2337f11f91c4bcc9dfd7af8067458

  • SHA256

    c2b3f54ed59faedcaa6768cb34e4348ae92ce54a4420024ec5ae400c7f84e1df

  • SHA512

    875868fc1de54ec3f1e120724793792db4cd6498e072deaedf9a98807ea6679345518abde58e29584ca2508a2fa9b8238e811ae40c1c32299fae0d0aae566f22

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjM8:AnBdOOtEvwDpj6zE

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 54e7f16c289298e8183b50572254ee90_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections