General
-
Target
3a417657bd1cbf0989c45b86f9c21b839e396ce7766771bedc4b77b83ecd313f
-
Size
352KB
-
Sample
221022-f1tdqsahb7
-
MD5
19f576ab9aac3ea1285e1670b1e3b2b1
-
SHA1
dc54ed445f74b2a40c2abb4c8d6d6aeef56aeb3b
-
SHA256
3a417657bd1cbf0989c45b86f9c21b839e396ce7766771bedc4b77b83ecd313f
-
SHA512
14095ad6edb0afd32c26a7f72404232e75c48afaecefb7507d0567479c67f4fc6c74a9a4d31827faf83c4b5968ae69e7bb0c6effe263779c13b630b4caf89edd
-
SSDEEP
6144:tWi+KRsvG89EXczNPhONmTnzcRhjgdJyTyT9tgfuKKeK8dGyvF:tEKb8NPENmjgRhjWJyTyBtgGT6Rv
Static task
static1
Behavioral task
behavioral1
Sample
3a417657bd1cbf0989c45b86f9c21b839e396ce7766771bedc4b77b83ecd313f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3a417657bd1cbf0989c45b86f9c21b839e396ce7766771bedc4b77b83ecd313f.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\_ReCoVeRy_+tdrtx.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/723BA5C86EF0E8
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/723BA5C86EF0E8
http://yyre45dbvn2nhbefbmh.begumvelic.at/723BA5C86EF0E8
http://xlowfznrg4wf7dli.ONION/723BA5C86EF0E8
Targets
-
-
Target
3a417657bd1cbf0989c45b86f9c21b839e396ce7766771bedc4b77b83ecd313f
-
Size
352KB
-
MD5
19f576ab9aac3ea1285e1670b1e3b2b1
-
SHA1
dc54ed445f74b2a40c2abb4c8d6d6aeef56aeb3b
-
SHA256
3a417657bd1cbf0989c45b86f9c21b839e396ce7766771bedc4b77b83ecd313f
-
SHA512
14095ad6edb0afd32c26a7f72404232e75c48afaecefb7507d0567479c67f4fc6c74a9a4d31827faf83c4b5968ae69e7bb0c6effe263779c13b630b4caf89edd
-
SSDEEP
6144:tWi+KRsvG89EXczNPhONmTnzcRhjgdJyTyT9tgfuKKeK8dGyvF:tEKb8NPENmjgRhjWJyTyBtgGT6Rv
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-