General

  • Target

    9769e18f7f54a16d743f2464c9b566d3_cryptolocker_JC.exe

  • Size

    137KB

  • MD5

    9769e18f7f54a16d743f2464c9b566d3

  • SHA1

    dcbb2d830dd634f49b9b13cdf792a9397ae77649

  • SHA256

    4968c1d3be7a87b5715eac256c3533b3aa21c3e0a5e673cb5f52dcdd94584dd2

  • SHA512

    f316bc23d6f7977105eac08e5b9d720967be20b8f09acf3e313f71fce2d84467e3866fd3432a9fdfa90f72142cfee1753b823daba7f7fcfd66c37991e4b64c7b

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G/TOe:z6a+CdOOtEvwDpjczE

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9769e18f7f54a16d743f2464c9b566d3_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections