General

  • Target

    359aba1260364b63b226e71aed91d75d_cryptolocker_JC.exe

  • Size

    112KB

  • MD5

    359aba1260364b63b226e71aed91d75d

  • SHA1

    de10a9e48cb27f61863839c8ae86f99be8fe378a

  • SHA256

    b37aaa470ce782b4d27ab444e6a977bc668169cfcd460d0b5bc43f6f32138988

  • SHA512

    f573da26564019d791e9e5f7d69f57f03d41d3b1f1feddc4483be3e016456d19a9ecebf18d4797d6ca977a6daf16d580b7f66695733a98dc60fe684ef80eb8cd

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerarX:T6a+rdOOtEvwDpjLzq

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 359aba1260364b63b226e71aed91d75d_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections