General

  • Target

    6faaac654ddc73ec9f7ae9a5846f3889_cryptolocker_JC.exe

  • Size

    88KB

  • MD5

    6faaac654ddc73ec9f7ae9a5846f3889

  • SHA1

    449df66c92184b20d4f6c35b2c89196f9657e3fb

  • SHA256

    4deec5cdcb70e7915b0a4fe1853bc46c24dc808b71fbd5c9701cfb0a3e6d4892

  • SHA512

    dee65732c6ce01d906aca6f6faa1486f0da73afc64d5a2e14cac0daa2ce294ece4a4d2b13c9d3cf20460d4cd45675d7868314f8742497f700372c2efb5c157f7

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRD0Z:zCsanOtEvwDpjT

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6faaac654ddc73ec9f7ae9a5846f3889_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections