General

  • Target

    604e1ad4610a359ab493c0368d897c14_cryptolocker_JC.exe

  • Size

    87KB

  • MD5

    604e1ad4610a359ab493c0368d897c14

  • SHA1

    4678d6839c712f448a4a5a27ec09fcc04c91d6da

  • SHA256

    1304cae1eefc75a13449c100ca603e3822bb7ce21e2cfbb8a7504acb08bdaa7b

  • SHA512

    234b46b4c8176a1dbfc161cd46d39e1b65c3227eb0438b3512e884de8588ca436601833672ef733f3d5984bdf2ba96b7be1cf330a406b1fc93ce0c7c08fe426e

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDWr:zCsanOtEvwDpjv

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 604e1ad4610a359ab493c0368d897c14_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections