General

  • Target

    b6ea6374f31e9a94e556cc14fbf76f46_cryptolocker_JC.exe

  • Size

    73KB

  • MD5

    b6ea6374f31e9a94e556cc14fbf76f46

  • SHA1

    d015d3a212df5430eaaa688f14ea27139ad0b41c

  • SHA256

    72c6a81e071c9db564a19c1f1b56d63b629f553f48dc1ec7d7fcb557fe26d451

  • SHA512

    93250e3cc5f9f43d1193826e0cd6093242e1f8de88966c577a0e57c83a2f13130ed071a8c1ce8e54cef8cb5c3993832dccddaa66d0d837678ec9c57e95bcb33b

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyQ9:zCsanOtEvwDpjN9

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • b6ea6374f31e9a94e556cc14fbf76f46_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections