General

  • Target

    6159f1b4365e2c593228d395b110f405_cryptolocker_JC.exe

  • Size

    64KB

  • Sample

    230804-vg44fsch22

  • MD5

    6159f1b4365e2c593228d395b110f405

  • SHA1

    80e944aec340e4dd1197b693791b31aaebd0ffd1

  • SHA256

    3b9a650cd53ada7c5becdf3a76ac6a18a3a6f885f31ec062889cb989343d2266

  • SHA512

    865e5be3b594510f840a47f17604c49c13cd389fa36e64dcd575c5d5ec9be4b0cea5e3580a23d6f1e60ebace0b8dc3974bf7c15e6117053c3a2b82d2968d8004

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTOOZu:T6a+rdOOtEvwDpjNQ

Score
7/10
upx

Malware Config

Targets

    • Target

      6159f1b4365e2c593228d395b110f405_cryptolocker_JC.exe

    • Size

      64KB

    • MD5

      6159f1b4365e2c593228d395b110f405

    • SHA1

      80e944aec340e4dd1197b693791b31aaebd0ffd1

    • SHA256

      3b9a650cd53ada7c5becdf3a76ac6a18a3a6f885f31ec062889cb989343d2266

    • SHA512

      865e5be3b594510f840a47f17604c49c13cd389fa36e64dcd575c5d5ec9be4b0cea5e3580a23d6f1e60ebace0b8dc3974bf7c15e6117053c3a2b82d2968d8004

    • SSDEEP

      1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTOOZu:T6a+rdOOtEvwDpjNQ

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks