General

  • Target

    36ab5b01e5ad761d71ad2225ad978788_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    36ab5b01e5ad761d71ad2225ad978788

  • SHA1

    280bf5ce37b0d58a3d0dde9bed3292188f499ee6

  • SHA256

    67623607395db8b68634a87033b069b748863597985a34b3d4e88bf11bb0fadc

  • SHA512

    14ae8db0dbb351a69d104e0610e1974e3235d627d05016a2903e4f2abb1e2d35b2bfd4ecd78a5b59420491554773b5aaf5b3e40e94b6bcfba63cd12be74b394f

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTOOZr:T6a+rdOOtEvwDpjNp

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 36ab5b01e5ad761d71ad2225ad978788_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections