General

  • Target

    60977200ce674ce7976e267da19df8c7_cryptolocker_JC.exe

  • Size

    70KB

  • MD5

    60977200ce674ce7976e267da19df8c7

  • SHA1

    0144b6f680cf375e7910759af19dd9d5c531341f

  • SHA256

    43f3703625492c40f5842bcb2f86ad01d2cbf3e6f7883dbcc92c2c181e1e02c6

  • SHA512

    523d0f933b2c57e67a5463362eabda0d6daf252357cd8e71036dfef569bfe623a78a5eda5da7b3b2a501a384d72658b7e4b366648ca25829729313f40ee1285e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSQ:T6a+rdOOtEvwDpjNy

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 60977200ce674ce7976e267da19df8c7_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections