General

  • Target

    6b6bb9c667d3b86f6b0db4155e2fb4f1_cryptolocker_JC.exe

  • Size

    112KB

  • MD5

    6b6bb9c667d3b86f6b0db4155e2fb4f1

  • SHA1

    c5dc87c07bbe41724b7f40f0057d5e3c0d789d0f

  • SHA256

    a2151b6f7f85a646bc9ce696247c88f9b081074cc1c03cd71fc1b92a34e65674

  • SHA512

    8fbe20f3a91684448e4dbb6cfe2da191d4d153a8be4f707f85d6986e511e1730b2a86db82a5e2644f86977ff35509818be8af0d9716d0b2a88aea2621f7dfd38

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerarS:T6a+rdOOtEvwDpjLzf

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6b6bb9c667d3b86f6b0db4155e2fb4f1_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections