General

  • Target

    60ed0920b4f1368f8f194cdf10368d89_cryptolocker_JC.exe

  • Size

    118KB

  • MD5

    60ed0920b4f1368f8f194cdf10368d89

  • SHA1

    879f04730bd02d95f69ea0f0b6e2de00b8f156ba

  • SHA256

    08890b273a12621e2ff193522f4e3b230e1459cbdf38eee014111eccda97092e

  • SHA512

    7390c02884fca63f2d566149682ecea896f00ecd558cf17236c45ff76ece43aa0950686d8967e946b03a2086dfdd3a08f31fe0c004d8c4d5b75daddc75d4ac64

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpQbCJjM:z6a+CdOOtEvwDpjcz3

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 60ed0920b4f1368f8f194cdf10368d89_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections