General

  • Target

    96870a97f9ecb905a110324272ac4350_cryptolocker_JC.exe

  • Size

    108KB

  • MD5

    96870a97f9ecb905a110324272ac4350

  • SHA1

    930aa9c27c4422aac83a5a5ebaf922c2a278fe68

  • SHA256

    9fde7ec5c83a4c7355e129429991325d0a431126bb7542aca69dbe256e5fef5e

  • SHA512

    c6e6c82c0f4c8a642520522fc68acfae97d3ebfe84bd903462275467c92c48b701748d3e407b91ef579658bdb407e842f2fb43944f2da7b295a8f21f662d6bfe

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp3fN:T6a+rdOOtEvwDpjLzQ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 96870a97f9ecb905a110324272ac4350_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections