General

  • Target

    6b45046d5749971001842504acecd2c3_cryptolocker_JC.exe

  • Size

    58KB

  • MD5

    6b45046d5749971001842504acecd2c3

  • SHA1

    3a96a6484bd8d9c2fff03279d1ef359cf957ab98

  • SHA256

    fbadd0b6c808e3c9b6ca56c173fc7c2acc2356e12d8bddd102313d13b3a226a4

  • SHA512

    bbdeda5b01e7cd243c12890c4c957bd5078928d433b91092eda7e2f43933fb495e54fdafcbf79f3c75f6136b8db6056fd854286de3369a29cc03c3c924f75b6c

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLaBZZTSoh+I4NpZ:T6QFElP6n+gxmddpMOtEvwDpjwaxTN0H

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6b45046d5749971001842504acecd2c3_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections