General

  • Target

    4f04918cc6ad74370fa38fe551e9bd89_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    4f04918cc6ad74370fa38fe551e9bd89

  • SHA1

    ef52bbe67489b8b9000f28187c12ef3c06ac2625

  • SHA256

    619524411340581ffa1aa23d753d0e624c48d9651d109a7b30f06126ade19aed

  • SHA512

    0369ce43bca250877f527ca1e6ac14ddcda503ff27fc5e82afc797eeaf787c09a3b4c095fbfec0557a1068e50d2f8fdeaeb53e5497e3ce766c8405c6bc76c005

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYfKhtPLBW:1nK6a+qdOOtEvwDpjW

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4f04918cc6ad74370fa38fe551e9bd89_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections