General
-
Target
a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522
-
Size
420KB
-
Sample
221108-t167gsfgh3
-
MD5
3dd401698586fc163555e651596621d5
-
SHA1
d17e5d37d45f60df5b8752e5a44a28de1b70da6b
-
SHA256
a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522
-
SHA512
23f38597863f70ac1cc73481467513a439792c9186ad27cec1bfa9ca97f7c87cd76c7a5433cde93e29a6c53f8740f41a3c076bb038d84553cb6e16ceb3e06bd2
-
SSDEEP
6144:gQHEannVRVHgyA37acHbkwKSvpruDo+sOJDy/GQoyVHi1i/nEtqhAxFzjtc7Ec6o:dHnVRCyAJKShulPk/GOVHZJcFlc7qUb
Static task
static1
Behavioral task
behavioral1
Sample
a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4063495947-34355257-727531523-1000\_RECoVERY_+rtmew.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/CD1030C47803E87
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/CD1030C47803E87
http://yyre45dbvn2nhbefbmh.begumvelic.at/CD1030C47803E87
http://xlowfznrg4wf7dli.ONION/CD1030C47803E87
Extracted
C:\$Recycle.Bin\S-1-5-21-2295526160-1155304984-640977766-1000\_RECoVERY_+dvlca.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/96868D11C7A036C7
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/96868D11C7A036C7
http://yyre45dbvn2nhbefbmh.begumvelic.at/96868D11C7A036C7
http://xlowfznrg4wf7dli.ONION/96868D11C7A036C7
Targets
-
-
Target
a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522
-
Size
420KB
-
MD5
3dd401698586fc163555e651596621d5
-
SHA1
d17e5d37d45f60df5b8752e5a44a28de1b70da6b
-
SHA256
a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522
-
SHA512
23f38597863f70ac1cc73481467513a439792c9186ad27cec1bfa9ca97f7c87cd76c7a5433cde93e29a6c53f8740f41a3c076bb038d84553cb6e16ceb3e06bd2
-
SSDEEP
6144:gQHEannVRVHgyA37acHbkwKSvpruDo+sOJDy/GQoyVHi1i/nEtqhAxFzjtc7Ec6o:dHnVRCyAJKShulPk/GOVHZJcFlc7qUb
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-