General

  • Target

    6c0b19c64de4e90dc283b702817b8284_cryptolocker_JC.exe

  • Size

    82KB

  • MD5

    6c0b19c64de4e90dc283b702817b8284

  • SHA1

    dbbd2959995dda1fb46381242ac09e9b2c1eeaa4

  • SHA256

    d8857f88438e67d197e7a9e7e464a69e31f0a34968d262fd8c04733cab3d24a9

  • SHA512

    297c13c08ad1e0bbe9ee399eddf82667e4a465b0d8d2f68e9759c4e68385974c25c05edacdc6cb3708c599954e4c750cdefd02c11488d7a66b29a956d6155303

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cR6:zCsanOtEvwDpjD

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6c0b19c64de4e90dc283b702817b8284_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections