General
-
Target
c70e314a85c183b41b319577e1ebad64353b883018cac97de2188520dbcd778e
-
Size
424KB
-
Sample
221022-gzkwmsbah3
-
MD5
7db02f9228554043de47b354221c8bca
-
SHA1
bbe4cd030c70151abd8dbf9e68caedc05e61dbde
-
SHA256
c70e314a85c183b41b319577e1ebad64353b883018cac97de2188520dbcd778e
-
SHA512
ba67aefe72db0025fea7222e6357e4d506bdc0054bcd59d7d5d41d147da063c1f89d29149f340d4896258851289da797a0957e8340d3e9bb58c7189d362b7ed9
-
SSDEEP
6144:lg696TSBF7DRiH9Pyn65fNkKJXXj8p8HmHorKspEJihalpr70PoXbftChXW3Axfg:t96kNqmMNTFQaEorEJ4E5blCJxfS6
Static task
static1
Behavioral task
behavioral1
Sample
c70e314a85c183b41b319577e1ebad64353b883018cac97de2188520dbcd778e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c70e314a85c183b41b319577e1ebad64353b883018cac97de2188520dbcd778e.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2295526160-1155304984-640977766-1000\_RECoVERY_+iemxf.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/F0D8AD7C16F8E766
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F0D8AD7C16F8E766
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/F0D8AD7C16F8E766
http://xlowfznrg4wf7dli.ONION/F0D8AD7C16F8E766
Targets
-
-
Target
c70e314a85c183b41b319577e1ebad64353b883018cac97de2188520dbcd778e
-
Size
424KB
-
MD5
7db02f9228554043de47b354221c8bca
-
SHA1
bbe4cd030c70151abd8dbf9e68caedc05e61dbde
-
SHA256
c70e314a85c183b41b319577e1ebad64353b883018cac97de2188520dbcd778e
-
SHA512
ba67aefe72db0025fea7222e6357e4d506bdc0054bcd59d7d5d41d147da063c1f89d29149f340d4896258851289da797a0957e8340d3e9bb58c7189d362b7ed9
-
SSDEEP
6144:lg696TSBF7DRiH9Pyn65fNkKJXXj8p8HmHorKspEJihalpr70PoXbftChXW3Axfg:t96kNqmMNTFQaEorEJ4E5blCJxfS6
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-