General

  • Target

    36c2f10c06de5c939e225282f1c19899_cryptolocker_JC.exe

  • Size

    94KB

  • MD5

    36c2f10c06de5c939e225282f1c19899

  • SHA1

    1c12152ed9ff3bfb06563014c0a48961b8b61032

  • SHA256

    0ed31b993b0db3d43bf6e086740cb9faeafc0aa9e702877ad51c45ce5c65c745

  • SHA512

    ee3903629f960a7f3a305f2fffb8afbc24b2ac8f81f610d11b5f8c41ca16c414839c1c88672d811c11b307641b92fdb8ccb8c44a29b5dd6157dd9040f8e08d35

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuvq:zCsanOtEvwDpji

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 36c2f10c06de5c939e225282f1c19899_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections