General

  • Target

    2a216f01191d16ee4eca6b7d34c0daab_cryptolocker_JC.exe

  • Size

    62KB

  • MD5

    2a216f01191d16ee4eca6b7d34c0daab

  • SHA1

    f1a0bf8a27e2d3b19282410ad27db7b295216808

  • SHA256

    1ab2b0159da300d44b976761d1659f8657341d9316601a49004d143325a39326

  • SHA512

    5ac031e24d7d8ff22fce39f585ade0b72b1c41652dc25816704ae3f715aa09affc50f6d08dba4680edf9a4057d311d580e23aceaa7bb7b18691e62acb2d9d927

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYXUXojZv:1nK6a+qdOOtEvwDpjU

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2a216f01191d16ee4eca6b7d34c0daab_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections