General

  • Target

    a062f158eb8bc59b433b2e5cb814c865_cryptolocker_JC.exe

  • Size

    134KB

  • MD5

    a062f158eb8bc59b433b2e5cb814c865

  • SHA1

    fe2885d89e5cfd33b8966b49d65424033895ffcf

  • SHA256

    6145eb09221552e319312d05297be829617516bfffe6a72b901a8df667a2e403

  • SHA512

    fd1dc8e6c6dcfd16941032a0cdd490233460175a190f77bff8a68dfc1b7dbfc018e96ba1e6222c78a6e4faf02c65cd39b05b11a65a94ba12d24e9238e97d0c2d

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G/TG:z6a+CdOOtEvwDpjcz3

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a062f158eb8bc59b433b2e5cb814c865_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections