General

  • Target

    4ff6dadefd712471db116cb5bf1a35f6_cryptolocker_JC.exe

  • Size

    96KB

  • MD5

    4ff6dadefd712471db116cb5bf1a35f6

  • SHA1

    ee642b692b9932e21d811c099d20411d82ee6870

  • SHA256

    abf2142d3406ad218921fb038559031c93e91ecb9430fa4cf5d6b327c41f4555

  • SHA512

    167ddcf96a9fcb05ecf1fa8d16170e6b470624f19bfbcc49e2afafc40b1a8a3a4bab425668b06ed52f2984fe1e6c4b74f9f23fbcb309b6024a09dc864e86eb29

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbyCbtKwjEh:z6a+CdOOtEvwDpjcK

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4ff6dadefd712471db116cb5bf1a35f6_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections