General

  • Target

    6672f200d386f4d924f2789f495818d5_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    6672f200d386f4d924f2789f495818d5

  • SHA1

    ea7ab26b2edc02623144405789b1f8ed6bf3ebb2

  • SHA256

    ee5f740539d5ecdab9c2757c1baaca569803799db1c2146867fd9a07cbfef142

  • SHA512

    3805654c607a933e5bfd88e9cf2c01863db83ae0cb0a1a1abbb4b7c0f1fd6390e97c2f97d3acd0977fd3a140239c770fd45d66bf4bb17e1c5cc9b02fdd8ff500

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GCx:1nK6a+qdOOtEvwDpjQ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6672f200d386f4d924f2789f495818d5_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections