General

  • Target

    2e2e8a623ae7b3008652e444ffd4b6b9_cryptolocker_JC.exe

  • Size

    137KB

  • MD5

    2e2e8a623ae7b3008652e444ffd4b6b9

  • SHA1

    a7a2ddf8a7fb18cf8cef9a054144ce3b67f41c18

  • SHA256

    aa3b2263283957a4a56a3c418c5e71abfbc6be7fe5d3a61573c5f308615bdf2d

  • SHA512

    f0a88be075bedb92e2ddf0698a84c15823435a7173ede71b6e22389d39215d0e33c1533a6e52b6f3db71f5e596970e2ee401b7c6700e9c5e4fd84c37d2255398

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G1Y:z6a+CdOOtEvwDpjczT

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2e2e8a623ae7b3008652e444ffd4b6b9_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections