General
-
Target
899941b8638c6c124728da17087fefbd1c9eceb9487dcd7bf89b3bedabcf2338
-
Size
424KB
-
Sample
221023-j1c9ashchr
-
MD5
d4cdafc2d8aef481a9b6830894efcfc1
-
SHA1
68d8668d0b606b97ad40daacd3e680d1badeaf3c
-
SHA256
899941b8638c6c124728da17087fefbd1c9eceb9487dcd7bf89b3bedabcf2338
-
SHA512
23420c2ad63d1beae4fdf992cc4032417204112a7b1405b2e9ef2ac0d1e5760e1a6dd2205cb16ce1448ad27ed674b52c0aa736e27223b34aa90fa1b8c2511532
-
SSDEEP
6144:NWmfUHQSVs1ZYi9Cz3cnPOqURF7T16kCQ4B1oyjqnVhyfVoXbftChXW3AxfulDGq:0mfUHQS0GiGc6R6kXP/nVAcblCJxfS6
Static task
static1
Behavioral task
behavioral1
Sample
899941b8638c6c124728da17087fefbd1c9eceb9487dcd7bf89b3bedabcf2338.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
899941b8638c6c124728da17087fefbd1c9eceb9487dcd7bf89b3bedabcf2338.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2295526160-1155304984-640977766-1000\_RECoVERY_+vrlmp.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/3889B2140F953DB
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/3889B2140F953DB
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/3889B2140F953DB
http://xlowfznrg4wf7dli.ONION/3889B2140F953DB
Targets
-
-
Target
899941b8638c6c124728da17087fefbd1c9eceb9487dcd7bf89b3bedabcf2338
-
Size
424KB
-
MD5
d4cdafc2d8aef481a9b6830894efcfc1
-
SHA1
68d8668d0b606b97ad40daacd3e680d1badeaf3c
-
SHA256
899941b8638c6c124728da17087fefbd1c9eceb9487dcd7bf89b3bedabcf2338
-
SHA512
23420c2ad63d1beae4fdf992cc4032417204112a7b1405b2e9ef2ac0d1e5760e1a6dd2205cb16ce1448ad27ed674b52c0aa736e27223b34aa90fa1b8c2511532
-
SSDEEP
6144:NWmfUHQSVs1ZYi9Cz3cnPOqURF7T16kCQ4B1oyjqnVhyfVoXbftChXW3AxfulDGq:0mfUHQS0GiGc6R6kXP/nVAcblCJxfS6
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-