General

  • Target

    999fbd5e4599f8f0559a3fc9c4327cd2_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    999fbd5e4599f8f0559a3fc9c4327cd2

  • SHA1

    59a74baf1e5784005c8713ca3dc2057ea9644c25

  • SHA256

    c5caa8f2067f905d94473b285c44bb8386d803ee0534e5aebb798a58274da7c0

  • SHA512

    73755d7203c25cc6b5e6a83403ff717cc25db9b82c60197691c8570406b51a7df2a96090059a8e182844eb5e1847df0b75b6f96f6e84e3c82022f6d0cd67d018

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gGcum/kLyMro2GtOOtEvwDpj/:z6QFElP6n+gGpmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 999fbd5e4599f8f0559a3fc9c4327cd2_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections