General
-
Target
aa964caab52edb4f277ba778098b672c7c84ee83a20714c6e4bc43a68470e558
-
Size
364KB
-
Sample
221108-bzm34saha3
-
MD5
7eb15a882e6e6adf023bf276b0c239b3
-
SHA1
86c13e2cd3aea4caef2753e7b9675f1d07a880d3
-
SHA256
aa964caab52edb4f277ba778098b672c7c84ee83a20714c6e4bc43a68470e558
-
SHA512
c23c11dd770fdb48640958caf67c2e002934db7622190f8d58502317e95898f4e8e427dabac34a00f1165bc065b7693422ba613d306fa3baeb562adb5239b552
-
SSDEEP
6144:BEAU1eeD624pGSoJDZ2sqIrU5AsZBbgyg4s43yirHwlzKPm:BvU1eeD6282JtOI2D3bzsEHrQBKP
Static task
static1
Behavioral task
behavioral1
Sample
aa964caab52edb4f277ba778098b672c7c84ee83a20714c6e4bc43a68470e558.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa964caab52edb4f277ba778098b672c7c84ee83a20714c6e4bc43a68470e558.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-999675638-2867687379-27515722-1000\_ReCoVeRy_+fcfws.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/8ECCCDAAA98F7B81
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/8ECCCDAAA98F7B81
http://yyre45dbvn2nhbefbmh.begumvelic.at/8ECCCDAAA98F7B81
http://xlowfznrg4wf7dli.ONION/8ECCCDAAA98F7B81
Extracted
C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\_ReCoVeRy_+vcfmx.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/14E6E5E3F6445C
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/14E6E5E3F6445C
http://yyre45dbvn2nhbefbmh.begumvelic.at/14E6E5E3F6445C
http://xlowfznrg4wf7dli.ONION/14E6E5E3F6445C
Targets
-
-
Target
aa964caab52edb4f277ba778098b672c7c84ee83a20714c6e4bc43a68470e558
-
Size
364KB
-
MD5
7eb15a882e6e6adf023bf276b0c239b3
-
SHA1
86c13e2cd3aea4caef2753e7b9675f1d07a880d3
-
SHA256
aa964caab52edb4f277ba778098b672c7c84ee83a20714c6e4bc43a68470e558
-
SHA512
c23c11dd770fdb48640958caf67c2e002934db7622190f8d58502317e95898f4e8e427dabac34a00f1165bc065b7693422ba613d306fa3baeb562adb5239b552
-
SSDEEP
6144:BEAU1eeD624pGSoJDZ2sqIrU5AsZBbgyg4s43yirHwlzKPm:BvU1eeD6282JtOI2D3bzsEHrQBKP
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-