General

  • Target

    60e12ac4c178278ab1aa74b506f62474_cryptolocker_JC.exe

  • Size

    67KB

  • MD5

    60e12ac4c178278ab1aa74b506f62474

  • SHA1

    10d994158cfddd3551498438625bb1292a65dc91

  • SHA256

    3777d7664002544554ca9d5c6d4400db06d34c58376e195428d156e4f845971a

  • SHA512

    48f9864737b7a808a246341c7c3c32b2ad4dd35c0dd4b97f2a747ad54adcbda34b9b34fb864a86bca33a8932287201bfab8ee11bf7739fbf37b6fd70842592f2

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYfKhBUzT:1nK6a+qdOOtEvwDpjm

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 60e12ac4c178278ab1aa74b506f62474_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections