General

  • Target

    2ca65fbe793898c7e36af8c102e36f12_cryptolocker_JC.exe

  • Size

    86KB

  • MD5

    2ca65fbe793898c7e36af8c102e36f12

  • SHA1

    b8b2a2c616303aeadc33f6014e0d21bcf6f92eb1

  • SHA256

    827bc03828426922736eeaf3ff9a0261fce187997db3133c537f6961712653dd

  • SHA512

    cefdd4630d8a7f8eec2425dfbd50765c1a1ed5647807abd271d032ae5ffe42d89c8e093be9ed9548c01be3b7299286fcd4512e2d75246ef23e22589622ccea71

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY10Y/YMsby:z6QFElP6n+gKmddpMOtEvwDpj3GYQbby

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2ca65fbe793898c7e36af8c102e36f12_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections