General

  • Target

    54f7231bf0ba4ef38e735d52c44bc24d_cryptolocker_JC.exe

  • Size

    122KB

  • MD5

    54f7231bf0ba4ef38e735d52c44bc24d

  • SHA1

    3a33be857ef189f6c173d1fbb008a6528b966a11

  • SHA256

    aeb8de9abfe10bb673b20a4d98d66e3fe228fd2f209a4b4bbd3c08b80754bcf4

  • SHA512

    5d16fe11042070048410bdd179109c10d20820278ec7e4a5516e63679f6490a5eda0b6a2c8525ee48b2d0cde23745e036cd8e3dd61a21b941453ab146e346907

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1e2:AnBdOOtEvwDpj6zg

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 54f7231bf0ba4ef38e735d52c44bc24d_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections