General

  • Target

    6188238e7916633ee9cdef13f4d8c95c_cryptolocker_JC.exe

  • Size

    138KB

  • MD5

    6188238e7916633ee9cdef13f4d8c95c

  • SHA1

    3cf381fca907ec321a72f7f5c050c457c388bd78

  • SHA256

    3beba4e4023d1409b65ab2becec6ff71a742322866ea5e7515cf8f8d23e8b6aa

  • SHA512

    2dfbffdf073173462d5d2cfc49367d2f63441f2186362d62fea0940f67c418bc3cd4baff89739b2f77cfedd8e65b95c4e8936f1f9a0a7b9ea96867c446d9012d

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1ep:z6a+CdOOtEvwDpjczT

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6188238e7916633ee9cdef13f4d8c95c_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections