General

  • Target

    c9c79398b452ab6797c19a5a70b0195d_cryptolocker_JC.exe

  • Size

    80KB

  • MD5

    c9c79398b452ab6797c19a5a70b0195d

  • SHA1

    7968a5881ab82182f445d15ccc18dcb746eb185b

  • SHA256

    bf1c205a5db495c15557ac0032a7f5970e4a541a5a763d02d2f4b26adc671f01

  • SHA512

    ad0aa2f72a9a6215555d9705ab7ea628c24a4355eac0391910f6d60e4ba451fbe5c88eaf8d07e383d77dd916be8a301ab22c5285a61856fd67a8e9d443eda941

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwapYTjipvF2Zr:T6a+rdOOtEvwDpjNpYvQd21

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • c9c79398b452ab6797c19a5a70b0195d_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections