General
-
Target
4abdace85327c89f59a735500b0bdaf46a19836dea447febf9003c9be54d7a24
-
Size
424KB
-
Sample
221022-pw69gadbb3
-
MD5
bd62e5f337506c58955c6cbd644239e0
-
SHA1
22aea8553c104e98c13cc8959497632ce3fecb3e
-
SHA256
4abdace85327c89f59a735500b0bdaf46a19836dea447febf9003c9be54d7a24
-
SHA512
bab3394cecb282ef415a63a6e971f9108094109b41512feb60f7976463cc3d927e6fbd7b58b092e1027da2e92d2c122a2dcd859237978e49f0bb95dd3342ee0e
-
SSDEEP
12288:tmJqaEwQLysD/XDz3qzRdW1DzHpblCJxfS6:tgMLyWDbkElOR1
Static task
static1
Behavioral task
behavioral1
Sample
4abdace85327c89f59a735500b0bdaf46a19836dea447febf9003c9be54d7a24.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4abdace85327c89f59a735500b0bdaf46a19836dea447febf9003c9be54d7a24.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2629973501-4017243118-3254762364-1000\_RECoVERY_+abkob.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/36BAE7A85EB8CA3
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/36BAE7A85EB8CA3
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/36BAE7A85EB8CA3
http://xlowfznrg4wf7dli.ONION/36BAE7A85EB8CA3
Targets
-
-
Target
4abdace85327c89f59a735500b0bdaf46a19836dea447febf9003c9be54d7a24
-
Size
424KB
-
MD5
bd62e5f337506c58955c6cbd644239e0
-
SHA1
22aea8553c104e98c13cc8959497632ce3fecb3e
-
SHA256
4abdace85327c89f59a735500b0bdaf46a19836dea447febf9003c9be54d7a24
-
SHA512
bab3394cecb282ef415a63a6e971f9108094109b41512feb60f7976463cc3d927e6fbd7b58b092e1027da2e92d2c122a2dcd859237978e49f0bb95dd3342ee0e
-
SSDEEP
12288:tmJqaEwQLysD/XDz3qzRdW1DzHpblCJxfS6:tgMLyWDbkElOR1
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-