General
-
Target
5529c2820a626ba0a3a9fcf82cc53e12bbe21de3c0c11e3f775a0ecfa12eeaca
-
Size
368KB
-
Sample
220725-vc2grsehb8
-
MD5
742b46e5aca6f3b85a306d955ec82903
-
SHA1
48727b21b0ece46fb80b450a586cdc38fb8e9830
-
SHA256
5529c2820a626ba0a3a9fcf82cc53e12bbe21de3c0c11e3f775a0ecfa12eeaca
-
SHA512
35f6137018d5a5133b41875ea6e4d6707c8f41fcd4897467335db4aa290cd1573e587e79d6a399878591dbc91cdc0d5a51493725732641a30dff464c0bf50761
Static task
static1
Behavioral task
behavioral1
Sample
5529c2820a626ba0a3a9fcf82cc53e12bbe21de3c0c11e3f775a0ecfa12eeaca.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5529c2820a626ba0a3a9fcf82cc53e12bbe21de3c0c11e3f775a0ecfa12eeaca.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\_RECoVERY_+iusld.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/582E911F7CBE5A83
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/582E911F7CBE5A83
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/582E911F7CBE5A83
http://xlowfznrg4wf7dli.ONION/582E911F7CBE5A83
Extracted
C:\$Recycle.Bin\S-1-5-21-2660308776-3705150086-26593515-1000\_RECoVERY_+dknxq.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/E5D51F91ADF36B5A
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/E5D51F91ADF36B5A
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/E5D51F91ADF36B5A
http://xlowfznrg4wf7dli.ONION/E5D51F91ADF36B5A
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\_RECoVERY_+dknxq.html
http://yyre45dbvn2nhbefbmh.begumvelic.at/E5D51F91ADF36B5A
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/E5D51F91ADF36B5A
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/E5D51F91ADF36B5A
http://xlowfznrg4wf7dli.onion/E5D51F91ADF36B5A
Targets
-
-
Target
5529c2820a626ba0a3a9fcf82cc53e12bbe21de3c0c11e3f775a0ecfa12eeaca
-
Size
368KB
-
MD5
742b46e5aca6f3b85a306d955ec82903
-
SHA1
48727b21b0ece46fb80b450a586cdc38fb8e9830
-
SHA256
5529c2820a626ba0a3a9fcf82cc53e12bbe21de3c0c11e3f775a0ecfa12eeaca
-
SHA512
35f6137018d5a5133b41875ea6e4d6707c8f41fcd4897467335db4aa290cd1573e587e79d6a399878591dbc91cdc0d5a51493725732641a30dff464c0bf50761
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-