General

  • Target

    6af39c77f72b100f8ec3bb8949dd25ba_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    6af39c77f72b100f8ec3bb8949dd25ba

  • SHA1

    5d941b9ce49f5cea9fd022c0d399cb0035836771

  • SHA256

    15137133a18f3e0186a44ed1d3ced34fe345ddc74bf8c4a9ba59da3ccf20e775

  • SHA512

    d0c9820742e84d5d07f711cc4345c6b329931763114ba8e098270294ac8d0f6d41bdd8877b5bab26af721c5d96a2761005be230251924af7c5be06d3f5ad8730

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gZoMum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+gZoZmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6af39c77f72b100f8ec3bb8949dd25ba_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections