General

  • Target

    26ec4b624e1d152fd2c32ae31face177_cryptolocker_JC.exe

  • Size

    112KB

  • MD5

    26ec4b624e1d152fd2c32ae31face177

  • SHA1

    68ce8c6ff581b75611e7593bba630f646c2b9540

  • SHA256

    924d4b0e2744294755a33685e3d9315bac87c8f43e3a71b0c8a0a14c6dc98cd8

  • SHA512

    21d90126a3ee421df919127e16eae115b724848a32d4a24887b38f15f275843e943f398272ba6ba706b51c64df7bb8084f5af782069dc47698e5b36dbacced1f

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerarD:T6a+rdOOtEvwDpjLz2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 26ec4b624e1d152fd2c32ae31face177_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections