General

  • Target

    6ae5616a3fe6d3508781a7452f7140f6_cryptolocker_JC.exe

  • Size

    86KB

  • MD5

    6ae5616a3fe6d3508781a7452f7140f6

  • SHA1

    3afb0b7f721abd3ea71459e6e49dc91a01ef839c

  • SHA256

    797184585241507e6e674ef80e19668a33b83a356b29f487ae9964bf1a8272ec

  • SHA512

    dc96f77dd5c3524b3a4b1d21857b74f4f389c13d5e4891de3df6a3f92ed7bde4bd4b68d9f9b75a88360a4d7df9aaee77539c56533144ca20099cf555aa440df3

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDj+7:zCsanOtEvwDpjF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6ae5616a3fe6d3508781a7452f7140f6_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections