General

  • Target

    f6a91e2cdad6dd680b0ef3d7507991d9_cryptolocker_JC.exe

  • Size

    76KB

  • MD5

    f6a91e2cdad6dd680b0ef3d7507991d9

  • SHA1

    cf5d4443fd8ec0042aa14a3b899f093639b084c6

  • SHA256

    773042e47d10a77e252082bb53ed6a0c3dff3f0b3c62a701bc67657241a26401

  • SHA512

    44637701a6ec26678b9aa9a8e89018d3ec4453887b009291f6924c5572508f5c5406930cd8bdf8ef550398947e974640cf3139821531754756a682f44c11b8b6

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUF:1nK6a+qdOOtEvwDpja

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f6a91e2cdad6dd680b0ef3d7507991d9_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections