General

  • Target

    9c1390be6d5f048de4c6043222cf2bb8_cryptolocker_JC.exe

  • Size

    79KB

  • MD5

    9c1390be6d5f048de4c6043222cf2bb8

  • SHA1

    0f74a968f2b36454d5572024b5a4b9053b0fcecb

  • SHA256

    deed2f2aef45832b38975fc07352f35eb4721af4fa85216bf1f1a5ac5e8ab16b

  • SHA512

    ff221c73781e24bacc570470f2474c336be3d80ddc5d01962ea0776fc44a6b30681a79da7d6355911f72afe6b870cbedc135ebc0397261e9766f639ce2770d8c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUXQaOKXa:T6a+rdOOtEvwDpjNt

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9c1390be6d5f048de4c6043222cf2bb8_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections