General

  • Target

    9d1f999a91bbb721c5ac37ecad31ea66_cryptolocker_JC.exe

  • Size

    86KB

  • MD5

    9d1f999a91bbb721c5ac37ecad31ea66

  • SHA1

    f5835d200ed710ad59e0d150023f2142a489b474

  • SHA256

    6f406d3eebeb400ab973c6f4e3a84d143f893c8db26b7f890b4218d9cdecb984

  • SHA512

    5e114d938a0798540f019bee158f11fc823de02b5fa436ab9589d5ee82b38568653da30d6e33e516c3522935067c172766ead4143fef4010829d648aa76234a7

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDj9W:zCsanOtEvwDpjV

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9d1f999a91bbb721c5ac37ecad31ea66_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections