General

  • Target

    5f6ffa6268ba9ddc0b867a0f1c712a36_cryptolocker_JC.exe

  • Size

    63KB

  • MD5

    5f6ffa6268ba9ddc0b867a0f1c712a36

  • SHA1

    08c797a02fa7da0e0e222fe6a3502c276034ec66

  • SHA256

    b89c7df75950b67b76a9f878eb7c47d4343e576fa9b0c6fa7ec5a9ddd8eabb06

  • SHA512

    2779dcdff4b81b698df66ec5f80b17f511231167d09d7ea760d8a4c81aa82682f906143c824c394c32110e9e34ec4be6c0f51f0f3b5da0fb67e7e05ebc2cced7

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsaLekXWzA3g:1nK6a+qdOOtEvwDpjn

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5f6ffa6268ba9ddc0b867a0f1c712a36_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections