General
-
Target
aca73acf92d5c709d17919f0d61f0db64bd50098fe2afe9e5834394dbaa611ae
-
Size
428KB
-
Sample
221022-grv2msbcbj
-
MD5
85b8d2fa326926f049d7d3b7a083e08e
-
SHA1
9884d2f5bce7405627495470893765a70f858242
-
SHA256
aca73acf92d5c709d17919f0d61f0db64bd50098fe2afe9e5834394dbaa611ae
-
SHA512
89d5b627a708974439e31079d122395c7e9ee06b345e2efa81e38a2821ceded0a1e95f919dcf44dce1dc509eeabae77264b8fadbe151408f63408c8b199090d7
-
SSDEEP
6144:1Tz+ZXamW2jpJuSTZBDdDgPME1m4SKlwIMvfAoXbftChXW3AxfulDGgB:Nz+YmJJuGZYbzz2IgfFblCJxfS6
Static task
static1
Behavioral task
behavioral1
Sample
aca73acf92d5c709d17919f0d61f0db64bd50098fe2afe9e5834394dbaa611ae.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aca73acf92d5c709d17919f0d61f0db64bd50098fe2afe9e5834394dbaa611ae.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\_RECoVERY_+fkhoy.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/D45D6F9C614BEA2
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/D45D6F9C614BEA2
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/D45D6F9C614BEA2
http://xlowfznrg4wf7dli.ONION/D45D6F9C614BEA2
Targets
-
-
Target
aca73acf92d5c709d17919f0d61f0db64bd50098fe2afe9e5834394dbaa611ae
-
Size
428KB
-
MD5
85b8d2fa326926f049d7d3b7a083e08e
-
SHA1
9884d2f5bce7405627495470893765a70f858242
-
SHA256
aca73acf92d5c709d17919f0d61f0db64bd50098fe2afe9e5834394dbaa611ae
-
SHA512
89d5b627a708974439e31079d122395c7e9ee06b345e2efa81e38a2821ceded0a1e95f919dcf44dce1dc509eeabae77264b8fadbe151408f63408c8b199090d7
-
SSDEEP
6144:1Tz+ZXamW2jpJuSTZBDdDgPME1m4SKlwIMvfAoXbftChXW3AxfulDGgB:Nz+YmJJuGZYbzz2IgfFblCJxfS6
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-