General

  • Target

    6f402fc5c7ee3b215a5f01a62b5a63d7_cryptolocker_JC.exe

  • Size

    59KB

  • MD5

    6f402fc5c7ee3b215a5f01a62b5a63d7

  • SHA1

    9db773bc8a4f4bc5953d0c0173f6d09fb0c49d73

  • SHA256

    44311584bf16fa5f56c9051e4b387b7eeace53eaa0baea2857a16abc45d002f2

  • SHA512

    842213ddc479eb4b873c2aba017c082aca0ae0ed6c9e53f81a1f1d47d831721bfc5b594fcb925a00eb4d0c2650cfd36014730a0c25729cc0acf75f88db1b3f26

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUPO:T6a+rdOOtEvwDpjNz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6f402fc5c7ee3b215a5f01a62b5a63d7_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections