General

  • Target

    9cfe67cb07bc14718cc9106d84cf5aee_cryptolocker_JC.exe

  • Size

    69KB

  • MD5

    9cfe67cb07bc14718cc9106d84cf5aee

  • SHA1

    f55e1b70b4f9d5246b310649137ecb5b59f272c0

  • SHA256

    3ee309c247a9846783d720f3b007d65f242e9047a1658ef0c59e61ffc48a8f9c

  • SHA512

    823e5945940da84b77c0713ab6eb7f5e8e4e314452f49f31047cf852828f26d09b00d9801afb960c5b6b44927349da0195c243674f20da164ee0fab4d019f3b4

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwa/h0n68AnVGwO:T6a+rdOOtEvwDpjN6v

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9cfe67cb07bc14718cc9106d84cf5aee_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections