General

  • Target

    2dc5c4cf06e6f4fbd5c48f01d8ef9235_cryptolocker_JC.exe

  • Size

    140KB

  • MD5

    2dc5c4cf06e6f4fbd5c48f01d8ef9235

  • SHA1

    ee76d4ac46260883114a0b3dc243144f1ff6e67b

  • SHA256

    6efddd02495c1aefd62341795ab09421de229f8abb4e518c02cf8d42e1e7b724

  • SHA512

    60a88be03d85d5932e9b39cb7720a205fb9ccf0a6a91894d5cfc8f685e76a916a606883843054cb262d4282184ee49e47aa14d57336bc7c8871cd4b9bf159fad

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G2:z6a+CdOOtEvwDpjczL

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2dc5c4cf06e6f4fbd5c48f01d8ef9235_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections