General

  • Target

    06fc95a9e551b59f09dc9c7459ad7fde_cryptolocker_JC.exe

  • Size

    80KB

  • MD5

    06fc95a9e551b59f09dc9c7459ad7fde

  • SHA1

    38ce111ec25a65e3c3312b894a1843e65f57c5bc

  • SHA256

    7ab9e741ae7d4548d8d6c4cfc424dfe1b72acddadf55680413efed90f7a2f048

  • SHA512

    5df0ff5445b4ecd6ed0cc8a6736786539c365d6e9bb58b97a2a92665e8a7c9ebdfb85a7ba93344517f9953e21ee76d1d912522a2c1cb33d4ab9c7600599bd4f8

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwapYTjipvF2Zb:T6a+rdOOtEvwDpjNpYvQd2V

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 06fc95a9e551b59f09dc9c7459ad7fde_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections