General

  • Target

    2ca301fbd05329543b003f986820477a_cryptolocker_JC.exe

  • Size

    98KB

  • Sample

    230801-s62craab6w

  • MD5

    2ca301fbd05329543b003f986820477a

  • SHA1

    45552d1711d8ddadd719b1af024db099c25660b7

  • SHA256

    62fdf857bb5ebb807dda6aae147736d1cf4cf2b5ac77bf46c76f91046ac85796

  • SHA512

    21be692dd7914baad54679e60372996acefdf4c237bc46e2abee4de224fe6048456ff27c8ce535f37cb40b9cc0ac4ac8251511ef99edd11d2257c640b957c339

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjMs:AnBdOOtEvwDpj6z0

Score
7/10
upx

Malware Config

Targets

    • Target

      2ca301fbd05329543b003f986820477a_cryptolocker_JC.exe

    • Size

      98KB

    • MD5

      2ca301fbd05329543b003f986820477a

    • SHA1

      45552d1711d8ddadd719b1af024db099c25660b7

    • SHA256

      62fdf857bb5ebb807dda6aae147736d1cf4cf2b5ac77bf46c76f91046ac85796

    • SHA512

      21be692dd7914baad54679e60372996acefdf4c237bc46e2abee4de224fe6048456ff27c8ce535f37cb40b9cc0ac4ac8251511ef99edd11d2257c640b957c339

    • SSDEEP

      1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjMs:AnBdOOtEvwDpj6z0

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks