General

  • Target

    9f8049bb833d8f7d1ea5585c742f3300_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    9f8049bb833d8f7d1ea5585c742f3300

  • SHA1

    846c257362833ac76300c32180fa0e8f1199f91e

  • SHA256

    1b465997cb7b3c35b5869885bdb96c205f2b273485b334a63d94ccd1cc3ef52d

  • SHA512

    585fd076aab39c15297cc23d192d914a3af3f3b4a32e031c17cf475e5c5c4815679f3f8f39212cb228ddaab20624167b0e6347b6f8d1c2bb3e6f28732d3ba6bc

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbyCbtKwjEl5:z6a+CdOOtEvwDpjcc

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9f8049bb833d8f7d1ea5585c742f3300_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections