General

  • Target

    f99c9808cdb47d118a232672cc16f1c3_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    f99c9808cdb47d118a232672cc16f1c3

  • SHA1

    ed5a4435bd016300a47539b0d7978967bbc35b59

  • SHA256

    393857e3cdd3fa0e3430032bb2fd0560c6c9e4a752464c34b2809c2037b3752d

  • SHA512

    97307df9754fd760d8eb5b43d0ba613c9433e0793d09494f53898d7a58ea883e0505891a8d7c28d4606b483d15f9164e6fbbb6993d9d2da0b77ee3a2391beb69

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GW+A:1nK6a+qdOOtEvwDpjI

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f99c9808cdb47d118a232672cc16f1c3_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections