General

  • Target

    9a5c7d899fd1f3daba90ff3440f56e13_cryptolocker_JC.exe

  • Size

    82KB

  • MD5

    9a5c7d899fd1f3daba90ff3440f56e13

  • SHA1

    bf90ed366333a0762f23e92af0c6a1c18f45414b

  • SHA256

    be7f6ea309a67eb58bda557b36522142f6ed9bc25859b177b9e8f2952b13c004

  • SHA512

    f1e215420a52535f85064379d2b389a9e0b5e326212a4a05ae5f0595032694a6785d2f2a75376cd4b68d3638ef9030e9733f4edff048ec62c3eaef17f18922dc

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOTN:T6a+rdOOtEvwDpjNt

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9a5c7d899fd1f3daba90ff3440f56e13_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections