General
-
Target
574cbeac6845a9d9770f302c0d27f0ab68be23ed6fd5c1ef1e3e4e37de4a90f6
-
Size
360KB
-
Sample
220724-3mmqcsddf4
-
MD5
8aea38995c4125b4721a8377a10736ee
-
SHA1
2175d7c1a97c15b30585208ba8379aa2aa08a002
-
SHA256
574cbeac6845a9d9770f302c0d27f0ab68be23ed6fd5c1ef1e3e4e37de4a90f6
-
SHA512
83457d4320de6850fd4370719666cdc86f3255a385c1875d4c9edab98b2a09902ce9e581429a9ebb2f4b76761c64c8ea3b2ad50c5683d3a11ce392222ac7f6d1
Static task
static1
Behavioral task
behavioral1
Sample
574cbeac6845a9d9770f302c0d27f0ab68be23ed6fd5c1ef1e3e4e37de4a90f6.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
574cbeac6845a9d9770f302c0d27f0ab68be23ed6fd5c1ef1e3e4e37de4a90f6.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\_ReCoVeRy_+mihkf.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/13C2F56D4495C5A3
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/13C2F56D4495C5A3
http://yyre45dbvn2nhbefbmh.begumvelic.at/13C2F56D4495C5A3
http://xlowfznrg4wf7dli.ONION/13C2F56D4495C5A3
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\_ReCoVeRy_+mihkf.html
Extracted
C:\$Recycle.Bin\S-1-5-21-2372564722-193526734-2636556182-1000\_ReCoVeRy_+cgrgp.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/CC39D1EDBAD2F07A
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/CC39D1EDBAD2F07A
http://yyre45dbvn2nhbefbmh.begumvelic.at/CC39D1EDBAD2F07A
http://xlowfznrg4wf7dli.ONION/CC39D1EDBAD2F07A
Extracted
C:\$Recycle.Bin\S-1-5-21-2372564722-193526734-2636556182-1000\_ReCoVeRy_+cgrgp.html
Targets
-
-
Target
574cbeac6845a9d9770f302c0d27f0ab68be23ed6fd5c1ef1e3e4e37de4a90f6
-
Size
360KB
-
MD5
8aea38995c4125b4721a8377a10736ee
-
SHA1
2175d7c1a97c15b30585208ba8379aa2aa08a002
-
SHA256
574cbeac6845a9d9770f302c0d27f0ab68be23ed6fd5c1ef1e3e4e37de4a90f6
-
SHA512
83457d4320de6850fd4370719666cdc86f3255a385c1875d4c9edab98b2a09902ce9e581429a9ebb2f4b76761c64c8ea3b2ad50c5683d3a11ce392222ac7f6d1
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-