General

  • Target

    0ab6878d22baabd7abe0c7c804b06451_cryptolocker_JC.exe

  • Size

    93KB

  • MD5

    0ab6878d22baabd7abe0c7c804b06451

  • SHA1

    5609d168636d4e30fd6a9547a659ef18e475e9ac

  • SHA256

    a429fb94ed741cf7db73df77be5a586eae4ea0c2f4faf21d04c536495acda88b

  • SHA512

    56c425ca623297248fdf562176e7b76b9c31ed2bcd0b1431411deab222857e76b247bcb2d62ad9966736c971a0c1a66b55254b22455642499889421bee56d3a0

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuvC:zCsanOtEvwDpja

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0ab6878d22baabd7abe0c7c804b06451_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections