General

  • Target

    606ff61a027ff029b96ebb684facb22a_cryptolocker_JC.exe

  • Size

    77KB

  • MD5

    606ff61a027ff029b96ebb684facb22a

  • SHA1

    28c6c78dfa5572f9752e61d1aa916476e44efe17

  • SHA256

    6cdf820f6259b85c4620562b03e88f1ae14bb7686b4199bb37d31c78131aa596

  • SHA512

    77e11ef235c7976c2fdcd2cb245d81edb1f56d152adaefa736423cc49cc49913ee8ab2e16717f2e7b6edcd1c25679b5b1f888813964f694677ec8a2762d3530f

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUXQaWS:T6a+rdOOtEvwDpjNM

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 606ff61a027ff029b96ebb684facb22a_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections