General

  • Target

    9b80c35b69fb73830ff231356406e31f_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    9b80c35b69fb73830ff231356406e31f

  • SHA1

    a5e814f9d390df44f18aff738c6883bbf20a1c26

  • SHA256

    3eab3bd3a9b7232aac74be9d9f31d7e0d06cb5b994715b85ee9d39ef79bc4d84

  • SHA512

    297afd7c7caeb2f6957192ef7bbc9fb9ffba4297ad48536bfce7d67f8b719b6465aef4821a039e8c5bd2e632743b94377e5ac19f08609c558f485a518334acce

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+g0/um/kLyMro2GtOOtEvwDpj/:z6QFElP6n+g0mmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9b80c35b69fb73830ff231356406e31f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections