General

  • Target

    9da4ecaebf4c9f47b4ee4bab615a7fbb_cryptolocker_JC.exe

  • Size

    87KB

  • MD5

    9da4ecaebf4c9f47b4ee4bab615a7fbb

  • SHA1

    4905b146fee2f098f716de2bd1c231230eace755

  • SHA256

    2211171db97a38382a8599681c07167a8c6610a710556bc0d51898ebbef5256e

  • SHA512

    f8f93e0381135da75ff57f4598c6598c2d1eb9579d32d4628c4d4d1d1531f17aff6902b78957685494812fefa0babf534a9c4f391652ccdc10e89bfef2b9d99b

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDD2:zCsanOtEvwDpjf

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9da4ecaebf4c9f47b4ee4bab615a7fbb_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections