General

  • Target

    9d74070e81633e8e35ff372547a821a0_cryptolocker_JC.exe

  • Size

    63KB

  • MD5

    9d74070e81633e8e35ff372547a821a0

  • SHA1

    1628762a12ccb0f02371c41e135a1c95b7e0d7f3

  • SHA256

    df8b5859c88b7198c06e2ba365aed6d5517f98769387bc1577290ffa839586c3

  • SHA512

    eea1bdd466774a987f6d417ad46c359d8d8923c6d55f9dd311b60217892d5ddead181a8999d7c14a873d87e3b7f9b012c17d9e6e4ccfd539710291a960c2a41c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTOOZt73d:T6a+rdOOtEvwDpjN5

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9d74070e81633e8e35ff372547a821a0_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections