General

  • Target

    53ab5f8df71af31345a9ced7b54f6cab_cryptolocker_JC.exe

  • Size

    96KB

  • MD5

    53ab5f8df71af31345a9ced7b54f6cab

  • SHA1

    0d44c053bcc0a74d5b8ef94184cca3d1cc68a4d2

  • SHA256

    0232f0208c1c839bc49894a6d5d39e78d70240afdecd4edc6529ee51d01a8994

  • SHA512

    c9ae79f70151d9b960f81bccbd4abf450f9b4be5fd7549f429a09947c084876b746841f797a918d13f303f9c5c5ad533ae4c946316045c99dbc8c8604d0711e7

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbyCbtKwjEV:z6a+CdOOtEvwDpjcW

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 53ab5f8df71af31345a9ced7b54f6cab_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections