General

  • Target

    9f4bb91f90bcad9bbb645b39ff7098cb_cryptolocker_JC.exe

  • Size

    59KB

  • MD5

    9f4bb91f90bcad9bbb645b39ff7098cb

  • SHA1

    79d248043ccc049f5efaa9fc782b654e11abe4c9

  • SHA256

    ede49b6623fb6830103f9cf45c492e601d868457515e15c84e6534646814eabc

  • SHA512

    80975ec9f4e65f79f4cf8e76fb10f3a7008b5776383f74f739696a4825c403ab65bbb1d43a8cd784099f1ba398afda63141d0b87a248b1bc1eba79f033e4d09d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTFH39fJ:T6a+rdOOtEvwDpjNr

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9f4bb91f90bcad9bbb645b39ff7098cb_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections