General

  • Target

    2a7c33da1c08ecb3a4f125c0e9a30307_cryptolocker_JC.exe

  • Size

    116KB

  • MD5

    2a7c33da1c08ecb3a4f125c0e9a30307

  • SHA1

    f8a9e19dd15baae662603386785a9e5958efd3da

  • SHA256

    228f926d217802dc41aedbcdf9aa355336c17920ff0bc9d1690d74cbcb259e62

  • SHA512

    4b541fe84f69158ebb9a7a60de7ed7772e2a53e6d85e98d3e9b642ba8fb551743c328c921776b6c489d9b90fc720a375697590a3f1f241ed12e3541d0e7076ce

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eY:AnBdOOtEvwDpj6ze

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2a7c33da1c08ecb3a4f125c0e9a30307_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections