General

  • Target

    99febf5fff40edd901e7b203c6575766_cryptolocker_JC.exe

  • Size

    55KB

  • MD5

    99febf5fff40edd901e7b203c6575766

  • SHA1

    fc424a9d69d7e3ceeb8094a985a68d37d4f1146a

  • SHA256

    8b7e3dee38274698783d4965c7a57fee067c146d2eb04007b7d3bb90b73fa5e4

  • SHA512

    47d0a101105fd52e79f75bf687f3bb0610a7cfc478a38aba69a68f0c00a582e31577efc0ccb2eac549db09dac551af97d9a45b03054c5a265c9bc2dbc91f2670

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLaBZoir4KtdOI:T6QFElP6n+gxmddpMOtEvwDpjwa3TtX

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 99febf5fff40edd901e7b203c6575766_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections