General

  • Target

    fa6bf1ad7fade0a03ece5dee2a572063_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    fa6bf1ad7fade0a03ece5dee2a572063

  • SHA1

    cbd95eb4390b63537a03fec45157a67d29bf2a63

  • SHA256

    554a05c907e88ecdca81b382baa2609574bd8a70682783a83f2e63aa0465ce32

  • SHA512

    1ddec4c135827f4197289800e99a87aa5308cbbd09f4cd3abe83a8eaddf490aa626c013acc25dc48e184da9db4d5fc60b4d5e5bddeaeab72f38c9e1471488b79

  • SSDEEP

    384:z0VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26JWFpPMYkW0NrD5v6ntOOtEvwDpjqIH:zQz7yVEhs9+8BMJP6ntOOtEvwDpjF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fa6bf1ad7fade0a03ece5dee2a572063_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections