General

  • Target

    0fb450cbeaefaa75c3a3c6558672b187_cryptolocker_JC.exe

  • Size

    93KB

  • MD5

    0fb450cbeaefaa75c3a3c6558672b187

  • SHA1

    c6d8d2732ab1c7261eb63a8bb424fac379d834c1

  • SHA256

    53bba855c39c9c9e13c63ef783c2c38e623f2babb219e5f6fad58be092dc28f4

  • SHA512

    6676ddb83ecec6dfab0194018cfe513efe944357fb1d6f9a923dd3c57327143317208a361e976a13ca2927940ab1f4657f840eab348af79777aa061104297b0f

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/B8:z6a+CdOOtEvwDpjcK

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0fb450cbeaefaa75c3a3c6558672b187_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections