General

  • Target

    4ee2a51f9eaf3c00a36f8b6fb26861d7_cryptolocker_JC.exe

  • Size

    61KB

  • MD5

    4ee2a51f9eaf3c00a36f8b6fb26861d7

  • SHA1

    224d0c2bbf1200132ec8cc08755b9b1b84a42610

  • SHA256

    4b2853d2a1c01377934731cfa6a8661e0571dbaefae9556d1eae57a45bceea35

  • SHA512

    24d37836561778ed080587abd4a6a0bea1e1d63741b842fbf9e93a5c0ace9683defd935648c6c2f11e2fd960d2713aaa9cefdcfd6f48eb21b51d5fa25e59cc99

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTOOZP:T6a+rdOOtEvwDpjNt

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4ee2a51f9eaf3c00a36f8b6fb26861d7_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections