General

  • Target

    2a626898e5ff78f6750c5bc29021dcfe_cryptolocker_JC.exe

  • Size

    137KB

  • MD5

    2a626898e5ff78f6750c5bc29021dcfe

  • SHA1

    f4e3944699ccf5e78a92e79bf9f69d06bc1d5022

  • SHA256

    a216917d12ae795556f61bd9e1fe7ad798e57e35caabd6817f7b92d2a5550dc1

  • SHA512

    1362fcf50cdb3426ea133d3b7911610526fcebd44bafa22ebed9156a1e833f2c1882f0bfd7d85d07847c64394fa49e97ac324aa2873aa147de1d585a8b9180f4

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G/T/:z6a+CdOOtEvwDpjczW

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2a626898e5ff78f6750c5bc29021dcfe_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections