General

  • Target

    2c49714682bab3c4d38b76f29bef4478_cryptolocker_JC.exe

  • Size

    118KB

  • MD5

    2c49714682bab3c4d38b76f29bef4478

  • SHA1

    2188d0756c9a42c02f5911344ba42e53478c8da3

  • SHA256

    97ee48c4db3a0e3757a72d9d885cff2749e9b69e27cb6ce5206ae8bc43c53779

  • SHA512

    46305b69d456044435880afcb9bcf7f6174cde0b9c2a599d73f223471569edba0363df54e462f2b51daca08bfef75c09e6208f1fe83dea828c35ffe0bbd79559

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpQb6k:z6a+CdOOtEvwDpjczN

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2c49714682bab3c4d38b76f29bef4478_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections