General

  • Target

    2e907de3d0c101803851667c354fb630_cryptolocker_JC.exe

  • Size

    59KB

  • MD5

    2e907de3d0c101803851667c354fb630

  • SHA1

    3d409b0690d1812ec922e7c73991ec247a11077f

  • SHA256

    eb538a65091d3ad8fe4477f9936e1355910ba46035198b35588ae1bbf60c9432

  • SHA512

    ca79a570fbba96c238bbd75db64e6b123fa83f0d11cdda4f0f21eefc8edd26636190e7fde0ab3f1e5c323ad7e036004e4451e0aed7ec5be7c4f0bc6ce6ffd9ec

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jKS:P8mnK6QFElP6n+gymddpMOtEvwDpjYA

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2e907de3d0c101803851667c354fb630_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections