General

  • Target

    99a439b5cbc5b715948cc76ca7a0b119_cryptolocker_JC.exe

  • Size

    136KB

  • MD5

    99a439b5cbc5b715948cc76ca7a0b119

  • SHA1

    073f3cf299380de610e792e3b83c16f0645ad7ab

  • SHA256

    d02d3cb89f6a2a941c8d1d0a98a05e18b4cf5b1d20db180c826147f55f9c817e

  • SHA512

    6c0efe8d1a6fd57bb1c44dd3edc61fd96e0e4dc4bef130159ce8513fb1c2f4bcea91fd54e8881eb5d60f4932989cd837c1baacd005b67ade0bbcacae3fb4446b

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GPynXS:z6a+CdOOtEvwDpjczq

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 99a439b5cbc5b715948cc76ca7a0b119_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections