General

  • Target

    2c10438ebdb6e8923d01feb9d6e48579_cryptolocker_JC.exe

  • Size

    117KB

  • MD5

    2c10438ebdb6e8923d01feb9d6e48579

  • SHA1

    5c1e99080c8b28f61fd6cabe33ef135804e0a3f5

  • SHA256

    592daaed672bca5da6ba3db43af99eb37b6a83a4bea5f2cd6037eb2abab3abcc

  • SHA512

    2d849e974329f2f22b1737b258b2f892532467816f7c060ccb537dba993edd5fdb54e63052ff03799c3a7b5fad0be2e637e17c941365f2c84f89e921072848a9

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1B:AnBdOOtEvwDpj6zq

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2c10438ebdb6e8923d01feb9d6e48579_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections