General
-
Target
4f59d67f5c5beb894b985377ca295b15cf333889ea2fb320d8a35bfb62b37bc4
-
Size
276KB
-
Sample
220720-csjb1sagc5
-
MD5
659108b6d71ea3b5eb8d8af03d520888
-
SHA1
1b58d8984c77f7d248c0a5f9d736ec741a4f076b
-
SHA256
4f59d67f5c5beb894b985377ca295b15cf333889ea2fb320d8a35bfb62b37bc4
-
SHA512
23c2b6d34ff76ffef2c531baedca42091781053297194d28a2db2424ee69eaff8e9b17803b663b63f9b6601832592220ffd718826a25e4627242be8bd5654b07
Static task
static1
Behavioral task
behavioral1
Sample
4f59d67f5c5beb894b985377ca295b15cf333889ea2fb320d8a35bfb62b37bc4.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
4f59d67f5c5beb894b985377ca295b15cf333889ea2fb320d8a35bfb62b37bc4.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\_ReCoVeRy_+chcqk.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/1DC859E3EC23919
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/1DC859E3EC23919
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/1DC859E3EC23919
http://xlowfznrg4wf7dli.ONION/1DC859E3EC23919
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\_ReCoVeRy_+chcqk.html
Targets
-
-
Target
4f59d67f5c5beb894b985377ca295b15cf333889ea2fb320d8a35bfb62b37bc4
-
Size
276KB
-
MD5
659108b6d71ea3b5eb8d8af03d520888
-
SHA1
1b58d8984c77f7d248c0a5f9d736ec741a4f076b
-
SHA256
4f59d67f5c5beb894b985377ca295b15cf333889ea2fb320d8a35bfb62b37bc4
-
SHA512
23c2b6d34ff76ffef2c531baedca42091781053297194d28a2db2424ee69eaff8e9b17803b663b63f9b6601832592220ffd718826a25e4627242be8bd5654b07
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-