General
-
Target
58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea
-
Size
504KB
-
Sample
220724-hhcpdabbe6
-
MD5
18920c2e6371a4b823ae25b3551312ad
-
SHA1
f8b6a50bfdd7d2165f5213eadf7963e47133fdbb
-
SHA256
58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea
-
SHA512
db5888e3dae86858fe367801622a277acb334592cbf90833651e5e0683dc7eff204fd2e109da9964e965b8b4c3d1c702aa6b83e6b3c550dab3272fa0889712b9
Static task
static1
Behavioral task
behavioral1
Sample
58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\_ReCoVeRy_+rpiac.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/179B25D15862461
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/179B25D15862461
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/179B25D15862461
http://xlowfznrg4wf7dli.ONION/179B25D15862461
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\_ReCoVeRy_+rpiac.html
Extracted
C:\$Recycle.Bin\S-1-5-21-2660308776-3705150086-26593515-1000\_ReCoVeRy_+gikdi.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/B2C863A8E0369513
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/B2C863A8E0369513
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/B2C863A8E0369513
http://xlowfznrg4wf7dli.ONION/B2C863A8E0369513
Extracted
C:\$Recycle.Bin\S-1-5-21-2660308776-3705150086-26593515-1000\_ReCoVeRy_+gikdi.html
Targets
-
-
Target
58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea
-
Size
504KB
-
MD5
18920c2e6371a4b823ae25b3551312ad
-
SHA1
f8b6a50bfdd7d2165f5213eadf7963e47133fdbb
-
SHA256
58bb6f379eed592c8703ec33ef5c28cc6ea22faac1bde1273b1ad6b2dfcc9fea
-
SHA512
db5888e3dae86858fe367801622a277acb334592cbf90833651e5e0683dc7eff204fd2e109da9964e965b8b4c3d1c702aa6b83e6b3c550dab3272fa0889712b9
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-