General
-
Target
d5072da0268ddd4e9b3ff085065f6cd37a4775b2dd28accc760bdb26bb213c03
-
Size
424KB
-
Sample
221024-g9f1faegh9
-
MD5
8645d34c68843e52ab1e135c360c9d7c
-
SHA1
19944335d09cf33d628581c83212b1774d519829
-
SHA256
d5072da0268ddd4e9b3ff085065f6cd37a4775b2dd28accc760bdb26bb213c03
-
SHA512
ec51fc5b7ab40fb2e1007dbaf8eb938620c2b325e78397bd42c9b2853f8a44f54c999dfe733646af80248145beaafbe4cd90d3255d78f825fe04a6f3ff62d869
-
SSDEEP
6144:nVA8n+saFT1r1Xu0MUHbhgD1fbVaQaYBK58vgVz8G8xypctxTmroXbftChXW3Ax4:nXJa71e01hqf8y46GYicnblCJxfS6
Static task
static1
Behavioral task
behavioral1
Sample
d5072da0268ddd4e9b3ff085065f6cd37a4775b2dd28accc760bdb26bb213c03.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d5072da0268ddd4e9b3ff085065f6cd37a4775b2dd28accc760bdb26bb213c03.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2891029575-1462575-1165213807-1000\_RECoVERY_+wqtjy.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/70B1516E70B6E5A8
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/70B1516E70B6E5A8
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/70B1516E70B6E5A8
http://xlowfznrg4wf7dli.ONION/70B1516E70B6E5A8
Targets
-
-
Target
d5072da0268ddd4e9b3ff085065f6cd37a4775b2dd28accc760bdb26bb213c03
-
Size
424KB
-
MD5
8645d34c68843e52ab1e135c360c9d7c
-
SHA1
19944335d09cf33d628581c83212b1774d519829
-
SHA256
d5072da0268ddd4e9b3ff085065f6cd37a4775b2dd28accc760bdb26bb213c03
-
SHA512
ec51fc5b7ab40fb2e1007dbaf8eb938620c2b325e78397bd42c9b2853f8a44f54c999dfe733646af80248145beaafbe4cd90d3255d78f825fe04a6f3ff62d869
-
SSDEEP
6144:nVA8n+saFT1r1Xu0MUHbhgD1fbVaQaYBK58vgVz8G8xypctxTmroXbftChXW3Ax4:nXJa71e01hqf8y46GYicnblCJxfS6
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-