General

  • Target

    6d6edbaa36405189bb6a2eaf7e3fb0c7_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    6d6edbaa36405189bb6a2eaf7e3fb0c7

  • SHA1

    340a95e670851becfe954aeafb4a996737bb171b

  • SHA256

    a3be1ec6636404884ac59140f33522315fa3d459a3f69170fe4b71e5e978f9ad

  • SHA512

    ff21f532b506cae7c0947fbf9188198bea8bd59a2dece6b53f19ea9dd6aeded1be44ec606299af45badfd9b0b5e84ed0c1a8750b7589ba61165bf944ab48688c

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gHBum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+gHMmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6d6edbaa36405189bb6a2eaf7e3fb0c7_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections