General

  • Target

    53029e58e0a0e38048133fa6a94ba90e_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    53029e58e0a0e38048133fa6a94ba90e

  • SHA1

    28d29ea86f89ee70bd2b0d3c2829095921a0655e

  • SHA256

    359ac16087c2c4c8229a5211fff13e0088d921d18ddfdd83901ee27d6b34e499

  • SHA512

    ecb1077cd174c4d7504880c3224ca6909fa083199c99746c5b2c98812d9cb03e815384d444c15735826f90d1768a331d3b7d3ef67eafc3be690dd298d6459891

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjZg:AnBdOOtEvwDpj6z1

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 53029e58e0a0e38048133fa6a94ba90e_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections