General
-
Target
54edee901226b97c3aeadf7b38106b7a2892dde1d39acd493609c97c6beea227
-
Size
360KB
-
Sample
220725-v5hv5acfcq
-
MD5
5d1888f6bc1df0a1f97b6833b69a0674
-
SHA1
9a94184fe7633045aac67a8fdba74b9b8dc586f2
-
SHA256
54edee901226b97c3aeadf7b38106b7a2892dde1d39acd493609c97c6beea227
-
SHA512
a45c54a3c0d1e97e7fc9913c763f6e3a6269b8820dfde6ca09bed66b8cc1758672480b5da42c9e422ba59ef7bc141b7101d843d2594e5cd7269fe4c229d587ef
Static task
static1
Behavioral task
behavioral1
Sample
54edee901226b97c3aeadf7b38106b7a2892dde1d39acd493609c97c6beea227.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
54edee901226b97c3aeadf7b38106b7a2892dde1d39acd493609c97c6beea227.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\_ReCoVeRy_+jvtcc.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/7CD1347263E17FC
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/7CD1347263E17FC
http://yyre45dbvn2nhbefbmh.begumvelic.at/7CD1347263E17FC
http://xlowfznrg4wf7dli.ONION/7CD1347263E17FC
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\_ReCoVeRy_+jvtcc.html
Extracted
C:\$Recycle.Bin\S-1-5-21-2660308776-3705150086-26593515-1000\_ReCoVeRy_+bptvw.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/6976C89FC1A16A1
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/6976C89FC1A16A1
http://yyre45dbvn2nhbefbmh.begumvelic.at/6976C89FC1A16A1
http://xlowfznrg4wf7dli.ONION/6976C89FC1A16A1
Extracted
C:\$Recycle.Bin\S-1-5-21-2660308776-3705150086-26593515-1000\_ReCoVeRy_+bptvw.html
Targets
-
-
Target
54edee901226b97c3aeadf7b38106b7a2892dde1d39acd493609c97c6beea227
-
Size
360KB
-
MD5
5d1888f6bc1df0a1f97b6833b69a0674
-
SHA1
9a94184fe7633045aac67a8fdba74b9b8dc586f2
-
SHA256
54edee901226b97c3aeadf7b38106b7a2892dde1d39acd493609c97c6beea227
-
SHA512
a45c54a3c0d1e97e7fc9913c763f6e3a6269b8820dfde6ca09bed66b8cc1758672480b5da42c9e422ba59ef7bc141b7101d843d2594e5cd7269fe4c229d587ef
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-