General

  • Target

    9bcb4fc04d9be8b189d8e2040c97e8a0_cryptolocker_JC.exe

  • Size

    69KB

  • MD5

    9bcb4fc04d9be8b189d8e2040c97e8a0

  • SHA1

    b90177084d105587c06e8a12fed8f3b5817292c7

  • SHA256

    5e75b138b2d2fec00df5ac85eecdd9b0d85e7d991884d3bb6deb382038f4dde7

  • SHA512

    c470d900a32ada920af20b37fd157ba6b8ea5ca32d0488327c4c78c28a92b7ea8cb77305bea67474e97c86d4bb8025ea50ac71dba94b8b9b432e2b5a24ddd7f0

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwa/h0n68AnVG27:T6a+rdOOtEvwDpjN68

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9bcb4fc04d9be8b189d8e2040c97e8a0_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections