General
-
Target
aadd5efb71bb89bb34a1e9c5b74263650db58e86282500274ec60483471ee616
-
Size
241KB
-
Sample
221107-223jpadge6
-
MD5
85e07404920e84e693161df4ce81bfa6
-
SHA1
92ecc63011dc37f9f11f66992d7fff3b5a7cda9a
-
SHA256
aadd5efb71bb89bb34a1e9c5b74263650db58e86282500274ec60483471ee616
-
SHA512
26f45999e96a8cd2f18bded2284384d19bc0eba8cb3912fa8b5f1c98508428f075d47f9935d33e6e459c017aa54e619fad8329fd26740850cfb70dd57d8c34be
-
SSDEEP
3072:rCu9Ctb8i+8Z+ZLPwmKvtVpclHePBCmYd1HJsbLytfuEi/Wfkoc76ieX5Mtmfy2:Uem+9/KvlqePNa1HmbZEbfQ6XB7
Static task
static1
Behavioral task
behavioral1
Sample
aadd5efb71bb89bb34a1e9c5b74263650db58e86282500274ec60483471ee616.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aadd5efb71bb89bb34a1e9c5b74263650db58e86282500274ec60483471ee616.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-999675638-2867687379-27515722-1000\Recovery+dbeqi.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/13C12F13B9BBFA6
http://tes543berda73i48fsdfsd.keratadze.at/13C12F13B9BBFA6
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/13C12F13B9BBFA6
http://xlowfznrg4wf7dli.ONION/13C12F13B9BBFA6
Targets
-
-
Target
aadd5efb71bb89bb34a1e9c5b74263650db58e86282500274ec60483471ee616
-
Size
241KB
-
MD5
85e07404920e84e693161df4ce81bfa6
-
SHA1
92ecc63011dc37f9f11f66992d7fff3b5a7cda9a
-
SHA256
aadd5efb71bb89bb34a1e9c5b74263650db58e86282500274ec60483471ee616
-
SHA512
26f45999e96a8cd2f18bded2284384d19bc0eba8cb3912fa8b5f1c98508428f075d47f9935d33e6e459c017aa54e619fad8329fd26740850cfb70dd57d8c34be
-
SSDEEP
3072:rCu9Ctb8i+8Z+ZLPwmKvtVpclHePBCmYd1HJsbLytfuEi/Wfkoc76ieX5Mtmfy2:Uem+9/KvlqePNa1HmbZEbfQ6XB7
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-