General

  • Target

    36e7d66cd96794f5da9f3b392aeb482a_cryptolocker_JC.exe

  • Size

    83KB

  • MD5

    36e7d66cd96794f5da9f3b392aeb482a

  • SHA1

    a53252749d912d33b522608201fc7437332504cf

  • SHA256

    8ccfba0561ffd32c6fc3e47618f25853dfad046b99ee3b2993606ad8b9f226a8

  • SHA512

    cc949da5073d2e28b70102150dd7a22bb524de091995e831dce0cd717973792971fd0dee1c43a6700b732ce5bdcbcdb4f220cfa279e11d29b7f65fe9717237fa

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOTFBEaBXZ:T6a+rdOOtEvwDpjNh

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 36e7d66cd96794f5da9f3b392aeb482a_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections