General

  • Target

    504f072fe671994c056fce0b8f40531d_cryptolocker_JC.exe

  • Size

    84KB

  • MD5

    504f072fe671994c056fce0b8f40531d

  • SHA1

    16fa43b858dd3f4beee2d4e2e59db4a5aad380b6

  • SHA256

    611ed570f4fbab99e7db24e87f16746cc2774188b93b1ba503b90874f5fe0a49

  • SHA512

    c445c8fe8047ae0ae3fb65063ca8b6c00f9ce4c00ae6444643ccba7d6dfbc3fd27b89752b32b10b2ef8f59419e5e936e2c6d4820407b94a1385bbb6cd0faf941

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOTzciJjHGlxsLH:T6a+rdOOtEvwDpjNwE

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 504f072fe671994c056fce0b8f40531d_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections