General

  • Target

    6fcbfe4200e506ff6c280083e02618d2_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    6fcbfe4200e506ff6c280083e02618d2

  • SHA1

    3ffd5f42db565fb809da0f6f2a3ecea187dfaba4

  • SHA256

    de061b8962b4ee9dd404f4e26d6197fea360db64397a3129600693a4eaae96e0

  • SHA512

    f9845b7255073e392df12f617effb2c3caebaebcb063b9d31585780e81ac059c8390a5c0b61ee433467114bc69743b6cae9232a7dff9250b45dd8a71385e05ca

  • SSDEEP

    768:qgmnjO6LsoEEeegiZPvEhHSG+gofum/kLyMro2GtOOtEvwDpj:qgmnK6QFElP6n+goGmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6fcbfe4200e506ff6c280083e02618d2_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections