General

  • Target

    6fb50dd5eb5010f006d5865b801f5a1b_cryptolocker_JC.exe

  • Size

    136KB

  • MD5

    6fb50dd5eb5010f006d5865b801f5a1b

  • SHA1

    466c0d9abc97ee27a1a2bd2a674beb2665c78abc

  • SHA256

    aa7d0fa6f307a29e4cd319b2203d2cacbecf966fd119ce0a38f7cea47867d808

  • SHA512

    8d00227d371fcc074bdfd78486d4247ac96a6a3b0a307ff5f3f2fed0c0312ff320fb92101fc9791be30fde586c7bd1e122154e67a3ce8d00b9f758c5a40efa40

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G/Ttv:z6a+CdOOtEvwDpjczo

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6fb50dd5eb5010f006d5865b801f5a1b_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections