General

  • Target

    b2c33d42d72dc9181d11371b1cff7075_cryptolocker_JC.exe

  • Size

    58KB

  • MD5

    b2c33d42d72dc9181d11371b1cff7075

  • SHA1

    ff5303cf2440eefa648da0ad4f83f1aeb725a94c

  • SHA256

    ab21bd4f8b542a9f01b03f8cbb974d6c2b92d7bd51fb8b336ea2c03d2290446d

  • SHA512

    35bec88678201770bace3d602a09b06b31a47ebfaf36395e683db58b52666fdf40aba86d799170678bd939b46e67a53bdb683d15410a86a09edf0c2c4df5b7f2

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLaBZoW0UyTq5ziFau:T6QFElP6n+gxmddpMOtEvwDpjwaTqFF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • b2c33d42d72dc9181d11371b1cff7075_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections