General
-
Target
4053bd7f73a8df7ae21b935bdcaeb57d768d9ddb86c5c46856b3eb7175f2e2d3
-
Size
424KB
-
Sample
221022-f3z93aahd2
-
MD5
df23ae2c9888695539d87c39e521930f
-
SHA1
da9f86e5df799d26aa3c266e0854223b3b85aac9
-
SHA256
4053bd7f73a8df7ae21b935bdcaeb57d768d9ddb86c5c46856b3eb7175f2e2d3
-
SHA512
60c2e626a74ebfe322586daf86f56da4d2abedbe03f33583ed065b0702a3eb554702b6480e66802eff1756118cc73827b7833b258c0a49b10df9eb5123ad55bb
-
SSDEEP
6144:dWmfUHQSVs1ZYi9Cz3cnPOqURF7T16kCQ4B1oyjqnVhyfVoXbftChXW3AxfulDGq:kmfUHQS0GiGc6R6kXP/nVAcblCJxfS6
Static task
static1
Behavioral task
behavioral1
Sample
4053bd7f73a8df7ae21b935bdcaeb57d768d9ddb86c5c46856b3eb7175f2e2d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4053bd7f73a8df7ae21b935bdcaeb57d768d9ddb86c5c46856b3eb7175f2e2d3.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\_RECoVERY_+dijxw.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/664BA4DAD856B681
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/664BA4DAD856B681
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/664BA4DAD856B681
http://xlowfznrg4wf7dli.ONION/664BA4DAD856B681
Targets
-
-
Target
4053bd7f73a8df7ae21b935bdcaeb57d768d9ddb86c5c46856b3eb7175f2e2d3
-
Size
424KB
-
MD5
df23ae2c9888695539d87c39e521930f
-
SHA1
da9f86e5df799d26aa3c266e0854223b3b85aac9
-
SHA256
4053bd7f73a8df7ae21b935bdcaeb57d768d9ddb86c5c46856b3eb7175f2e2d3
-
SHA512
60c2e626a74ebfe322586daf86f56da4d2abedbe03f33583ed065b0702a3eb554702b6480e66802eff1756118cc73827b7833b258c0a49b10df9eb5123ad55bb
-
SSDEEP
6144:dWmfUHQSVs1ZYi9Cz3cnPOqURF7T16kCQ4B1oyjqnVhyfVoXbftChXW3AxfulDGq:kmfUHQS0GiGc6R6kXP/nVAcblCJxfS6
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-