General

  • Target

    99e0295b8f1042d4ab23eeaae67499e1_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    99e0295b8f1042d4ab23eeaae67499e1

  • SHA1

    0ef3ab48c006fc7b23e0024d748bfaf7807b4199

  • SHA256

    84d0a9a96c7e07578b1c01495e440922b8564cca67c0a1ad9c65b24abe9ab2ec

  • SHA512

    1693f74f33e7d659c57e11838d6c786371327cd0656406113015f06d8949e8e0ae80b2700a4e7df5172318b7ca5d16ec0ef1ef48b2ba9ffb8a3ba7d8fda3638b

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjZt:AnBdOOtEvwDpj6z4

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 99e0295b8f1042d4ab23eeaae67499e1_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections