General
-
Target
0602f79c52643a332e5cbb22fe241826b1f3a12ad83b4f934b6d1d2a78cc6981
-
Size
360KB
-
Sample
221022-cmz3ksabfq
-
MD5
6ddeb9f7d1a1280673d8ce9275ae688d
-
SHA1
0d114b641ce91822410fcb575c608b3c20e47e20
-
SHA256
0602f79c52643a332e5cbb22fe241826b1f3a12ad83b4f934b6d1d2a78cc6981
-
SHA512
8a42094cc4f4b4f46f15bd1e43f56909eba0ce806305aaa5d5ac456af27e1348b0b2219dc8fa65995084c56e49c1a2c282fd10169333559d7c7b0706cbe9f378
-
SSDEEP
6144:z7gwRLGIfDA/Bgy8SqxglbUuYk6juoK6IqivYaBhdea7Qd88bM:QwRLZfDApo0AbSoKc2Yaxm8t
Static task
static1
Behavioral task
behavioral1
Sample
0602f79c52643a332e5cbb22fe241826b1f3a12ad83b4f934b6d1d2a78cc6981.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0602f79c52643a332e5cbb22fe241826b1f3a12ad83b4f934b6d1d2a78cc6981.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2295526160-1155304984-640977766-1000\_ReCoVeRy_+kamvd.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/91BABD163CC56935
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/91BABD163CC56935
http://yyre45dbvn2nhbefbmh.begumvelic.at/91BABD163CC56935
http://xlowfznrg4wf7dli.ONION/91BABD163CC56935
Targets
-
-
Target
0602f79c52643a332e5cbb22fe241826b1f3a12ad83b4f934b6d1d2a78cc6981
-
Size
360KB
-
MD5
6ddeb9f7d1a1280673d8ce9275ae688d
-
SHA1
0d114b641ce91822410fcb575c608b3c20e47e20
-
SHA256
0602f79c52643a332e5cbb22fe241826b1f3a12ad83b4f934b6d1d2a78cc6981
-
SHA512
8a42094cc4f4b4f46f15bd1e43f56909eba0ce806305aaa5d5ac456af27e1348b0b2219dc8fa65995084c56e49c1a2c282fd10169333559d7c7b0706cbe9f378
-
SSDEEP
6144:z7gwRLGIfDA/Bgy8SqxglbUuYk6juoK6IqivYaBhdea7Qd88bM:QwRLZfDApo0AbSoKc2Yaxm8t
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-