General

  • Target

    6b94ed9cba18eb1ff3f715f8037abf13_cryptolocker_JC.exe

  • Size

    137KB

  • MD5

    6b94ed9cba18eb1ff3f715f8037abf13

  • SHA1

    a759f132e7a27c4c55992258d69aeb54015340e8

  • SHA256

    11f50774e9e0eae244374a477ae5ebd234047ff4b18f861898151c279a8ef93d

  • SHA512

    efc93e5f6413b35e42197b05cdc9af6aa2a025cdf0cef9f6fae9ae41988564f946ce5200d71b083d41bf28feed460e87bdf03565566ca66f262e2a4b07cbed9e

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G/T4:z6a+CdOOtEvwDpjczd

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6b94ed9cba18eb1ff3f715f8037abf13_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections