General

  • Target

    fc6cd54e1523c45217ab267e7f1ed385_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    fc6cd54e1523c45217ab267e7f1ed385

  • SHA1

    2ae411e1f413372c66c673a180aeb4445499fc94

  • SHA256

    7239b65de28f04185a57b6263a9679d9a0b482e00ee72dbd36a9b95cc3034a2d

  • SHA512

    d28a6f47f5de42d014cd4d867553ddcc7213d3e6ce52cfa0fbd82f8ef3fb876c9351f8e9b4ceb807c5f2fa505e0d00cf7a013d6cc13bc54a0ff6a7b1a2fff6a7

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+g1Hum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+g1OmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fc6cd54e1523c45217ab267e7f1ed385_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections