General

  • Target

    6d19f301dd82d9a5a1790c60949446cb_cryptolocker_JC.exe

  • Size

    99KB

  • MD5

    6d19f301dd82d9a5a1790c60949446cb

  • SHA1

    a3af8d487884c8ce6dae3d1304673e97ac4704c7

  • SHA256

    caf8a504120c16b322424f58b60db926f610da1a107c3d1ddcb438934cd79984

  • SHA512

    cecd26d19fbdc4fe03828fa46559bfeb03b0d7eccedeb834696fac88909daa24320c5b96a5cc8eb205683de9735ef44eb84ae11246483a2558ffee638d9c3b48

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn58+R:1nK6a+qdOOtEvwDpj6

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6d19f301dd82d9a5a1790c60949446cb_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections