General

  • Target

    2b50b3959d53b3f78b86d8893f6cec1e_cryptolocker_JC.exe

  • Size

    136KB

  • MD5

    2b50b3959d53b3f78b86d8893f6cec1e

  • SHA1

    9aa3ad4ae864e98fde2ae07a477de8fde9323282

  • SHA256

    18cf9e9a4b0d9ffa4073aa95e519e20bdf851257e2bd8932a1be4da9fb68dc37

  • SHA512

    7db49d6ce416dfadf0ba16783e0180cabec0441e36998a661abc380bd9a15b36a2d5496e5fb4442c366f681f35d7d895f2be779bbadb166422541eb0b639ff28

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G1s:z6a+CdOOtEvwDpjczX

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2b50b3959d53b3f78b86d8893f6cec1e_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections