General
-
Target
eec3604acc91abae3343db62517ef3a8e9a222b6ef86660ba7b20173dc91ba4d
-
Size
352KB
-
Sample
221024-fx1cwaegel
-
MD5
7426abca716ab576b667c130dc31c470
-
SHA1
1e375576e068393dd947462dc16b9b8f685a346a
-
SHA256
eec3604acc91abae3343db62517ef3a8e9a222b6ef86660ba7b20173dc91ba4d
-
SHA512
672f01eb4e71ff9442c4e8d9a1b2ee1459d6ffb41551df6c6a32ee91510e1f9e524e82ddabdb8620efb7f29cedca9a3abd2b071f4eb0a195a7140749923d3543
-
SSDEEP
6144:mS48iSC8d+s1ScRmCHY++2RaKcUu4lzyWHBzRrvF:BHC4xkB2ROOBVrv
Static task
static1
Behavioral task
behavioral1
Sample
eec3604acc91abae3343db62517ef3a8e9a222b6ef86660ba7b20173dc91ba4d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eec3604acc91abae3343db62517ef3a8e9a222b6ef86660ba7b20173dc91ba4d.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\_ReCoVeRy_+ugeod.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/8AFF19DE6AB18461
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/8AFF19DE6AB18461
http://yyre45dbvn2nhbefbmh.begumvelic.at/8AFF19DE6AB18461
http://xlowfznrg4wf7dli.ONION/8AFF19DE6AB18461
Targets
-
-
Target
eec3604acc91abae3343db62517ef3a8e9a222b6ef86660ba7b20173dc91ba4d
-
Size
352KB
-
MD5
7426abca716ab576b667c130dc31c470
-
SHA1
1e375576e068393dd947462dc16b9b8f685a346a
-
SHA256
eec3604acc91abae3343db62517ef3a8e9a222b6ef86660ba7b20173dc91ba4d
-
SHA512
672f01eb4e71ff9442c4e8d9a1b2ee1459d6ffb41551df6c6a32ee91510e1f9e524e82ddabdb8620efb7f29cedca9a3abd2b071f4eb0a195a7140749923d3543
-
SSDEEP
6144:mS48iSC8d+s1ScRmCHY++2RaKcUu4lzyWHBzRrvF:BHC4xkB2ROOBVrv
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-