General

  • Target

    0f6d1c5a4d604d14a9b2688bfd1839c5_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    0f6d1c5a4d604d14a9b2688bfd1839c5

  • SHA1

    a1ac2002c23a942e42b2c4aa860718939319fdf5

  • SHA256

    b247e0ae4b9fbda8cc1a10840ca02e503a32d602f6357650edab203ddd748fe2

  • SHA512

    26ba0a8a555ab6a474c709878be02d1e904e978842b88095011c01149836417451d94d4fd001c7c9ac0d24383f660b0dec0d3143fa4cb86354374eb00b54768a

  • SSDEEP

    768:qImnjO6LsoEEeegiZPvEhHSG+g0cum/kLyMro2GtOOtEvwDpj:qImnK6QFElP6n+g0pmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0f6d1c5a4d604d14a9b2688bfd1839c5_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections