General

  • Target

    9ba292d7744b22f22de4ae9e27e3ce44_cryptolocker_JC.exe

  • Size

    80KB

  • MD5

    9ba292d7744b22f22de4ae9e27e3ce44

  • SHA1

    81c5afd34cba295ed559a23d87df524dbb54715c

  • SHA256

    a71912028853a343dc65248be8344afd63625b829930ede6830db7cb528f929c

  • SHA512

    bac88e4ef4c48dafb8c77840066e5e08a0c25b89ced1b9097fb4a26eb354ce4f7bc683d3b358d00c10e3e9f622945037a53cadf36c80290985d51c977a50ed8c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwapYTjipvF2ZO:T6a+rdOOtEvwDpjNpYvQd2s

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9ba292d7744b22f22de4ae9e27e3ce44_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections