General

  • Target

    6bbc10bfa15a84d77aea0a7b790b8264_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    6bbc10bfa15a84d77aea0a7b790b8264

  • SHA1

    083fe14d72bb8f8c07ce7f24892802232f1701a0

  • SHA256

    84fae1210bd108fd0f94e697962352bfe4034521523d4aad5e19c9dd3f456995

  • SHA512

    a8c6f4161a88f0a41806d128731540414519170e06d49e0a62abedc05565dc30910898eb006b6eb6148993ace46f49cccffbae92e8b53cbe790c48ac60553fe2

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gZtMum/kLyMro2GtOOtEvwDpjh:T6QFElP6n+gZtZmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6bbc10bfa15a84d77aea0a7b790b8264_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections