General

  • Target

    4c600f1755ac6750b752de306fc885d7_cryptolocker_JC.exe

  • Size

    100KB

  • MD5

    4c600f1755ac6750b752de306fc885d7

  • SHA1

    456912e9c43c236d388e0123e11318d6fefb71df

  • SHA256

    2f8a6c32ae220bd0d6fa77c1c8461bef3103797cb1784477f88dbe61856a7bbe

  • SHA512

    a6feaa809c0abc96b3c13ec6ed7eea36e4afe6490f123095341320a15667d119327fa4145bfccbd88fe04b47c04f8f973bf4bfab56c1e7ec332ca84deed75992

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn58+/:1nK6a+qdOOtEvwDpjI

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4c600f1755ac6750b752de306fc885d7_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections