General

  • Target

    f9a15eb07fe3f972680a9219470a7179_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    f9a15eb07fe3f972680a9219470a7179

  • SHA1

    519746aa84a7b697696b7dcbd388440c84b11f28

  • SHA256

    59017414eea3a8c2a0027058b7cd632dfe9292872bec785994329cf30496e75e

  • SHA512

    c20380f750f15f7c642078fb14909603c461e2a6027ced7a4a808805061dd0db33bda4588ae5b90b45ed64a823edfabc76744a351c690e588f67bb2a2fe87200

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GZFx:1nK6a+qdOOtEvwDpjN

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f9a15eb07fe3f972680a9219470a7179_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections