General

  • Target

    57fd8dc00cf7b13fecaf128b7ca5bd38_cryptolocker_JC.exe

  • Size

    81KB

  • MD5

    57fd8dc00cf7b13fecaf128b7ca5bd38

  • SHA1

    33078be9d51f2b10c1778bb89721e9d37b3238ca

  • SHA256

    971ae5fc2228ea51fb34be37d9aa1fa8e2944c58d9b71b38f217717a37f3c140

  • SHA512

    d86eb058d6f983b1d318f2e1a894950507d993dd2dfd89a7cc6cfb12a64cac5cdc640aea390a3ed17d7b92546f2948492c206b83b6838079efd480774158e9dc

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT71s:T6a+rdOOtEvwDpjNW

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 57fd8dc00cf7b13fecaf128b7ca5bd38_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections