General

  • Target

    f6f7bbc215eb8e4e807e32adad26777e_cryptolocker_JC.exe

  • Size

    139KB

  • MD5

    f6f7bbc215eb8e4e807e32adad26777e

  • SHA1

    c624ea728548e3670e1543311b3317b1e9d81889

  • SHA256

    f99a001c2814d879b2f8da67a538ba12f8f16c8dd2ae8a04a21532afe339e893

  • SHA512

    6ec1125726b48cec7a2e5a8bd7bed0bb087449ad8128104b710afb3080fed5567121a27ab91555e52f39a82dba1d3624f415a0b46105126d89d9ac6262b62122

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp699G/TG4dYn:T6a+rdOOtEvwDpjLzp

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f6f7bbc215eb8e4e807e32adad26777e_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections