General

  • Target

    2a7830dddb4e3c99763bbdbf1c98612f_cryptolocker_JC.exe

  • Size

    88KB

  • MD5

    2a7830dddb4e3c99763bbdbf1c98612f

  • SHA1

    55510fe1f88ccb0d75240ee81843288f841fc0bc

  • SHA256

    aab5ea5a8389b05205dafb1822aa0406b676a9eaa7f5601c61ca3a0390f07292

  • SHA512

    6ace3830aebe512433d1c921ff6d491e1b48038d0a836275c4bed3112ed4eb9a93c48443125a6d0b9258bce9f4a43e514b53f3f36c18cf4eaaec680730c96eb0

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDC:zCsanOtEvwDpjv

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2a7830dddb4e3c99763bbdbf1c98612f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections