General
-
Target
2fad5fb99831e5e600023e5b015cba99a23cb7bfaba42e81ad2b2aa6cb8c7ecd
-
Size
348KB
-
Sample
221022-mjkhtscehp
-
MD5
96bf108af2eafc33969cfb9f8ace6a25
-
SHA1
f170c820fac79c4851061980b1eaa3318c3d2377
-
SHA256
2fad5fb99831e5e600023e5b015cba99a23cb7bfaba42e81ad2b2aa6cb8c7ecd
-
SHA512
635d942a295da9b77fcd1e80864bf11a4fe7f6ea3075c152511be9b7e411af0ca11c67b99305ff9a40a99cc106ba613365c936f357b7e30376c7ddd01f1dc46c
-
SSDEEP
6144:tTyNbpChrXMCfgR0R42+YKHZaOMMQB6WCtQ+tugD3lmhcJvF:tTsparXN4g+HZafFE6gLlmhcJv
Static task
static1
Behavioral task
behavioral1
Sample
2fad5fb99831e5e600023e5b015cba99a23cb7bfaba42e81ad2b2aa6cb8c7ecd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2fad5fb99831e5e600023e5b015cba99a23cb7bfaba42e81ad2b2aa6cb8c7ecd.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2891029575-1462575-1165213807-1000\_ReCoVeRy_+emssj.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/D4ACFB41CD5935C
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/D4ACFB41CD5935C
http://yyre45dbvn2nhbefbmh.begumvelic.at/D4ACFB41CD5935C
http://xlowfznrg4wf7dli.ONION/D4ACFB41CD5935C
Targets
-
-
Target
2fad5fb99831e5e600023e5b015cba99a23cb7bfaba42e81ad2b2aa6cb8c7ecd
-
Size
348KB
-
MD5
96bf108af2eafc33969cfb9f8ace6a25
-
SHA1
f170c820fac79c4851061980b1eaa3318c3d2377
-
SHA256
2fad5fb99831e5e600023e5b015cba99a23cb7bfaba42e81ad2b2aa6cb8c7ecd
-
SHA512
635d942a295da9b77fcd1e80864bf11a4fe7f6ea3075c152511be9b7e411af0ca11c67b99305ff9a40a99cc106ba613365c936f357b7e30376c7ddd01f1dc46c
-
SSDEEP
6144:tTyNbpChrXMCfgR0R42+YKHZaOMMQB6WCtQ+tugD3lmhcJvF:tTsparXN4g+HZafFE6gLlmhcJv
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-