General
-
Target
fa2812d525eef1c413193f79161dbfedcf81e29eb908ac328789a0fd5e7732cc
-
Size
424KB
-
Sample
221024-lvw6bsfgg6
-
MD5
7369debfdc6669f8ef7c3b166b4bf041
-
SHA1
9bdf47f361536d04057121835e04dead701ec134
-
SHA256
fa2812d525eef1c413193f79161dbfedcf81e29eb908ac328789a0fd5e7732cc
-
SHA512
b18f00bd21dac95dda8591be3388398345a4397bba58d7dbb30a2fb616088b72de9037c52adbef9a7e72a79a95ef61e59c381f0c57c2e27db9e23eb24fb8af2c
-
SSDEEP
12288:M8DHMRGy57LfvdOkoy3ATY5r4TblCJxfS6:M8IT9FOGrwOR1
Static task
static1
Behavioral task
behavioral1
Sample
fa2812d525eef1c413193f79161dbfedcf81e29eb908ac328789a0fd5e7732cc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa2812d525eef1c413193f79161dbfedcf81e29eb908ac328789a0fd5e7732cc.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2629973501-4017243118-3254762364-1000\_RECoVERY_+qyxko.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/F1B84CBC087D719
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F1B84CBC087D719
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/F1B84CBC087D719
http://xlowfznrg4wf7dli.ONION/F1B84CBC087D719
Targets
-
-
Target
fa2812d525eef1c413193f79161dbfedcf81e29eb908ac328789a0fd5e7732cc
-
Size
424KB
-
MD5
7369debfdc6669f8ef7c3b166b4bf041
-
SHA1
9bdf47f361536d04057121835e04dead701ec134
-
SHA256
fa2812d525eef1c413193f79161dbfedcf81e29eb908ac328789a0fd5e7732cc
-
SHA512
b18f00bd21dac95dda8591be3388398345a4397bba58d7dbb30a2fb616088b72de9037c52adbef9a7e72a79a95ef61e59c381f0c57c2e27db9e23eb24fb8af2c
-
SSDEEP
12288:M8DHMRGy57LfvdOkoy3ATY5r4TblCJxfS6:M8IT9FOGrwOR1
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-