General

  • Target

    f6f8afb7c40648020b6ffb7c31306d26_cryptolocker_JC.exe

  • Size

    88KB

  • MD5

    f6f8afb7c40648020b6ffb7c31306d26

  • SHA1

    74fe231ed7014daf092a6185475c0e2744473154

  • SHA256

    0604d7077e9b5a69bb958c494b94aff0080882af5cdc2203e7df1f822b420258

  • SHA512

    12cd3db249761c9c5cc183aac02519b4b2058c4e5ca25bffb1ac1f5e82c1405ff0145864d19c1c5c6da6136d2ce81c9f5268d217142bd99abe905f76f5049118

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRD0t:zCsanOtEvwDpjX

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f6f8afb7c40648020b6ffb7c31306d26_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections