General

  • Target

    9cc4fd66a01fb7b9f47cace3db4c8a0c_cryptolocker_JC.exe

  • Size

    70KB

  • MD5

    9cc4fd66a01fb7b9f47cace3db4c8a0c

  • SHA1

    d3bfe37b2f5f842ecd81594448293728c3523abb

  • SHA256

    350c98f1056f0a5305d205ad55e5bc2994ed43f7dfd57abac888eda256a85678

  • SHA512

    44351651d1762a4cfabec605ee76607239fd2a5ab3d90513fc4682269e9288df54b3360604fd9a638613fc9d2d293e1fd02809b73d21d404036d029f1ba08446

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YS+:T6a+rdOOtEvwDpjNE

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9cc4fd66a01fb7b9f47cace3db4c8a0c_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections