General

  • Target

    6d2c3fa2cd14e37e31fddd978c0548ca_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    6d2c3fa2cd14e37e31fddd978c0548ca

  • SHA1

    e41273735809288f9c66c2d778c414daaf1b48b3

  • SHA256

    a38012c5f732f218be4bfcdee299095f64d2699b4f0f5f613d115f25b7d645f3

  • SHA512

    a83c41603921153e6693765721fac511828b8a76a6d02cb49a9131fd9ab4fdc27584cacec7e1c8cd32cb39a8b73466da6e5b937ff6462075f821a91eee77d7fa

  • SSDEEP

    384:z0VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26JWFVrYkW0NrD5v6ntOOtEvwDpjqIGa:zQz7yVEhs9+8tJP6ntOOtEvwDpjF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6d2c3fa2cd14e37e31fddd978c0548ca_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections