General

  • Target

    f6b10fcd1ee1dbb6d6d3ba484512b6ad_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    f6b10fcd1ee1dbb6d6d3ba484512b6ad

  • SHA1

    9f243bf41cc8aca3bb4eecf4eea0c4ca4e101b4d

  • SHA256

    e0ee38ca59fd352c4e7c4464ec7750068d7debcce1ab1e86b1039369b701d523

  • SHA512

    c61fa198cf9de959b9a8fd17dea3fec8daf44af7da46dd7b9095c02ea9b127874f2d1ea7740246bdbd1a67591ca71f676a0a8dd50ec12ae444e9626baa341b3a

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gm:1nK6a+qdOOtEvwDpjm

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f6b10fcd1ee1dbb6d6d3ba484512b6ad_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections