General

  • Target

    6b256bf3d69d22d824dee5dd4812d51c_cryptolocker_JC.exe

  • Size

    108KB

  • MD5

    6b256bf3d69d22d824dee5dd4812d51c

  • SHA1

    80d2e88780620c9e5e9db28dff357a8a84572aae

  • SHA256

    0235a7aadc380d00f9994e9a0982741bd50afa3543f9e16f85aaec19c79fa7f4

  • SHA512

    a0f90545cacfb0d724e3ea6eec571354f06d554f32eb140d9dd92ade4a9fd4aa6064a005a714edb2e9c6b0f75e6beaabf48d75abe7bf9b58732eeb76f6ab5bf5

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp3fK:T6a+rdOOtEvwDpjLz7

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6b256bf3d69d22d824dee5dd4812d51c_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections