General

  • Target

    6b325f5ee5c7b26589e809d1af76b4c8_cryptolocker_JC.exe

  • Size

    99KB

  • MD5

    6b325f5ee5c7b26589e809d1af76b4c8

  • SHA1

    8019dba09139e31b1e33b6722087a4d288edf9af

  • SHA256

    a40ccb1a0f92a06521b2feeaccb5f4208573344f562d6c6d94709ab5f9b65f42

  • SHA512

    715ebcb8f61933f616c6a0f6601f28c2f7bb312081b8b341f6916d7d7f99811dcc8cc177630307e7bea8bd1deb454971b4ba3f57f039ca253fddf8a072318fb0

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn58+g:1nK6a+qdOOtEvwDpj3

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6b325f5ee5c7b26589e809d1af76b4c8_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections