General
-
Target
a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724
-
Size
396KB
-
Sample
221108-q6pb3saga6
-
MD5
52ec44494fed2c9bebd5ce99903b7775
-
SHA1
6191526cf35f080922830412c795df4fed5f8696
-
SHA256
a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724
-
SHA512
100a3704d165eda1c8ac9e17c593934e76fe947971e8a9cf6dacbf7304927bd103cda0ae82f1e87530548a0b1832476277c493738bdf421e2e8c1ced7fca2ad7
-
SSDEEP
6144:Q0sTdSkul5CpfZsu43jx0HdEouuj5axxn7JCpIKxZU/bc92A6mJOl:FG7pfZsu43d0HdEFuj5EpNbWAcsoOl
Static task
static1
Behavioral task
behavioral1
Sample
a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-999675638-2867687379-27515722-1000\_RECoVERY_+wdwld.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/7387685FD14E526
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/7387685FD14E526
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/7387685FD14E526
http://xlowfznrg4wf7dli.ONION/7387685FD14E526
Extracted
C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\_RECoVERY_+icowb.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/8968F8A25AB9DCFE
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/8968F8A25AB9DCFE
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/8968F8A25AB9DCFE
http://xlowfznrg4wf7dli.ONION/8968F8A25AB9DCFE
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\_RECoVERY_+icowb.html
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/8968F8A25AB9DCFE
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/8968F8A25AB9DCFE
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/8968F8A25AB9DCFE
http://xlowfznrg4wf7dli.onion/8968F8A25AB9DCFE
Targets
-
-
Target
a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724
-
Size
396KB
-
MD5
52ec44494fed2c9bebd5ce99903b7775
-
SHA1
6191526cf35f080922830412c795df4fed5f8696
-
SHA256
a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724
-
SHA512
100a3704d165eda1c8ac9e17c593934e76fe947971e8a9cf6dacbf7304927bd103cda0ae82f1e87530548a0b1832476277c493738bdf421e2e8c1ced7fca2ad7
-
SSDEEP
6144:Q0sTdSkul5CpfZsu43jx0HdEouuj5axxn7JCpIKxZU/bc92A6mJOl:FG7pfZsu43d0HdEFuj5EpNbWAcsoOl
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-