General
-
Target
6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c
-
Size
276KB
-
Sample
220731-gxr7yacba4
-
MD5
1337977b7af4214aedeb3c4b237bc9e8
-
SHA1
7f22d5c419e5f5f3c6c303721cbf5921d5dd68f0
-
SHA256
6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c
-
SHA512
a90bef3e3199693ec5ba6c9e5a7590f09d201899637bbd7d836ea3dbc9d066c0235bceb8dee346c15615454ae0754b5b61e79e7d96ed4ceba954b4c269914f1d
Static task
static1
Behavioral task
behavioral1
Sample
6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c.exe
Resource
win10v2004-20220722-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+ylgku.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/4C4896E112CC541C
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/4C4896E112CC541C
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/4C4896E112CC541C
http://xlowfznrg4wf7dli.ONION/4C4896E112CC541C
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+ylgku.html
Extracted
C:\$Recycle.Bin\S-1-5-21-3463845317-933582289-45817732-1000\_ReCoVeRy_+jdtkk.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/954441D3624E359F
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/954441D3624E359F
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/954441D3624E359F
http://xlowfznrg4wf7dli.ONION/954441D3624E359F
Extracted
C:\$Recycle.Bin\S-1-5-21-3463845317-933582289-45817732-1000\_ReCoVeRy_+jdtkk.html
Targets
-
-
Target
6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c
-
Size
276KB
-
MD5
1337977b7af4214aedeb3c4b237bc9e8
-
SHA1
7f22d5c419e5f5f3c6c303721cbf5921d5dd68f0
-
SHA256
6039a38b191fbf47f98ddce678f3b16d14cad0c78c64f924a59ba690e1eb621c
-
SHA512
a90bef3e3199693ec5ba6c9e5a7590f09d201899637bbd7d836ea3dbc9d066c0235bceb8dee346c15615454ae0754b5b61e79e7d96ed4ceba954b4c269914f1d
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-