General

  • Target

    2cdff4dba00625e0ef317e6f69e8bf04_cryptolocker_JC.exe

  • Size

    50KB

  • MD5

    2cdff4dba00625e0ef317e6f69e8bf04

  • SHA1

    30291658b0f65380bcb41976ef1f949eedeffa16

  • SHA256

    31bcd0c6cb151b6357daa21309dab8e36872f0ac72dc52664d15744897f5a2f6

  • SHA512

    05960e1b76d1c8b4c8d4711b6eba711049dcee790c52a1852f52504a09dfd9737b094ba6a5231d35260f0c05552f5d7a0d322bb5a737226c6f90ba420e608920

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0kk2l:zj+soPSMOtEvwDpj4yG

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2cdff4dba00625e0ef317e6f69e8bf04_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections