General

  • Target

    6c84265b6f0271d4655480039471a468_cryptolocker_JC.exe

  • Size

    61KB

  • MD5

    6c84265b6f0271d4655480039471a468

  • SHA1

    64e941b37f34e85347a73ad501bd0fb880eee424

  • SHA256

    292dae8ee1106e649a10a91826cdc6023f3f110edef112a0c8f3fa9541c10a5e

  • SHA512

    1d7c108997106668f3163012c1fa189e98676261526c10041b20ad1647065e03cd6c522f5fb01666a43263eb9c3bb5298a2037e6691691a2e8932f7fa7457e21

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTOOZM:T6a+rdOOtEvwDpjN6

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6c84265b6f0271d4655480039471a468_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections