General

  • Target

    062d4f6c810764dee52f3762509a8212_cryptolocker_JC.exe

  • Size

    71KB

  • MD5

    062d4f6c810764dee52f3762509a8212

  • SHA1

    90ecd37050b1a4f2747fe9bdb38e3ee063dbf23d

  • SHA256

    d6aabca83dc5a7ba2f13a4c858cbbceb7b3ae63ad3097674d9f3c52bb12b655d

  • SHA512

    89d007a84a6c5bd05b53fc1d9316281c32a2cd45bad84e72b80a80e46836fda8bbe1c96764c7fbaada1ba4ec3fb7833a30381a398c450d6b8dc348c23a51cb2d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTJk5asCZce:T6a+rdOOtEvwDpjNB

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 062d4f6c810764dee52f3762509a8212_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections