General

  • Target

    9bf1f9a87c5e09b30a108ef09cdf00f2_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    9bf1f9a87c5e09b30a108ef09cdf00f2

  • SHA1

    d4f22e81bc4acbc7492be2344ecd20a6f760c1a1

  • SHA256

    b607934f9dc3e7f4ee8ee19f0cf2a2fd2069b709168bbd0297f7912c9a0dbb05

  • SHA512

    650c0cf74ee8e7c68c6ecc630990070b5224cb05eebb327b3af8b9eebaed9da17605741202b677b2f01aad48a18c9e3133aa7516a5ac1c59b86e055dc2df6dc0

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j68N/E8:1nK6a+qdOOtEvwDpjB

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9bf1f9a87c5e09b30a108ef09cdf00f2_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections