General

  • Target

    6c1919370bafeda394ff92680a87d5af_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    6c1919370bafeda394ff92680a87d5af

  • SHA1

    8c796a5c5c1f314483890378563911860c431119

  • SHA256

    4176681480f9bb2a55f605b93bc0414e9193cbcd727b97059d14bfa6fa9c6f31

  • SHA512

    42ba7478f96c7d62d983991acd9f47c17baa98ddec54bc14570d0c461182fa2d026b7361e3988b650cff9ef73c847c55a50c553762e0fb3dce62722b9e3bf00b

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAn4:z6a+CdOOtEvwDpjQ3

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6c1919370bafeda394ff92680a87d5af_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections