General
-
Target
5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22
-
Size
360KB
-
Sample
220801-f8nhfschhp
-
MD5
85315030e7efbe46eb1318d0bd0a558e
-
SHA1
1ed6de7ca6f0ab330bba35c15301ae0dc5338234
-
SHA256
5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22
-
SHA512
6c76e8bff6906c4dea42640849a347161a9d53f6a4ff40efd08aa06a5d2e53b762bdb710e4f53f94025345db2ddceec8f028354a1581774f44a0afd11a553958
Static task
static1
Behavioral task
behavioral1
Sample
5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+wydlt.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/33661A5894EB23A4
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/33661A5894EB23A4
http://yyre45dbvn2nhbefbmh.begumvelic.at/33661A5894EB23A4
http://xlowfznrg4wf7dli.ONION/33661A5894EB23A4
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+wydlt.html
Extracted
C:\$Recycle.Bin\S-1-5-21-2372564722-193526734-2636556182-1000\_ReCoVeRy_+rasie.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/75F386CCBD38A41
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/75F386CCBD38A41
http://yyre45dbvn2nhbefbmh.begumvelic.at/75F386CCBD38A41
http://xlowfznrg4wf7dli.ONION/75F386CCBD38A41
Extracted
C:\$Recycle.Bin\S-1-5-21-2372564722-193526734-2636556182-1000\_ReCoVeRy_+rasie.html
Targets
-
-
Target
5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22
-
Size
360KB
-
MD5
85315030e7efbe46eb1318d0bd0a558e
-
SHA1
1ed6de7ca6f0ab330bba35c15301ae0dc5338234
-
SHA256
5cb5f13c24b9631c14ddb4fe893ff4fad3da3dda8cf353013d4a5ddf09d08f22
-
SHA512
6c76e8bff6906c4dea42640849a347161a9d53f6a4ff40efd08aa06a5d2e53b762bdb710e4f53f94025345db2ddceec8f028354a1581774f44a0afd11a553958
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-