General

  • Target

    9cc9bac0af2ae060714f713344f0eaa0_cryptolocker_JC.exe

  • Size

    57KB

  • MD5

    9cc9bac0af2ae060714f713344f0eaa0

  • SHA1

    a32ee54216bd16fec5fdcf2f1d868934fcac0bbb

  • SHA256

    5e0187d701c81b477e33b1423912ac5722d12d33f8089643d4a6fee30939b472

  • SHA512

    5af9063cd7fb1e460c785bc727cbf8abc616758483852b91470b0b88bbbbcc8d60d8b74cb91b9679ca213875b33faba8f856a585d9f493171c099c0234bc7385

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaUq:P8mnK6QFElP6n+gymddpMOtEvwDpjYb

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9cc9bac0af2ae060714f713344f0eaa0_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections