General

  • Target

    9a9cbdef3579dbf92dfc549213334829_cryptolocker_JC.exe

  • Size

    70KB

  • MD5

    9a9cbdef3579dbf92dfc549213334829

  • SHA1

    1bfe5317aa5214c93394662f8fc83d3c6f1ac317

  • SHA256

    cc26fdb20ef42d20de668f47a580adb9ee6ad88d73cf7cee6ae2a4f579714046

  • SHA512

    a05002fccc7c6217ca11a0237a79d587e13e70bce7306290eb239c2e12933a3cb39ce0fa49c9077a1373615528c7c6c9d0fc69597480ce13d2bff625f57af55b

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSY:T6a+rdOOtEvwDpjNa

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9a9cbdef3579dbf92dfc549213334829_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections