General

  • Target

    606f795c19a81cc2412e7775d974360e_cryptolocker_JC.exe

  • Size

    96KB

  • MD5

    606f795c19a81cc2412e7775d974360e

  • SHA1

    5d3a9f64dfb89b53f84a66aeed62d26f8abdccb2

  • SHA256

    4a7914358473b10d9405911d0db8ec1e4b6a201517c8ea60fd5bc4c6b546d9c6

  • SHA512

    9dc7d7292fbf4e10cb72b261edce64fdeb1e9974a7d2a5e7afdbbb04a74cb97d1808d04c71a4e47f57b45a768b4a1e448f9c3cbffee30cc8546afc3fc1f4f743

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbyCbtKwjEApT:z6a+CdOOtEvwDpjc/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 606f795c19a81cc2412e7775d974360e_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections