General
-
Target
b04f17c1d93ca085b43623689be0bbf6eb6d9c725b47293b31054d4195e56c34
-
Size
420KB
-
Sample
221204-cr5hvsha95
-
MD5
1200f630d960ea698515201af0f0c006
-
SHA1
5ba609358b8526c0378df266aff57b7aa21e3ed9
-
SHA256
b04f17c1d93ca085b43623689be0bbf6eb6d9c725b47293b31054d4195e56c34
-
SHA512
a72aa470f9f4f1ecd22eff01a9e74ca74c03f42f96a6004e330138673b2b52576dfa663ea8671daa6f7ae5f82bf9e7bb931b559540d336263cbf3aa2c8c0178d
-
SSDEEP
6144:ZQHEannVRVHgyA37acHbkwKSvpruDo+sOJDy/GQoyVHi1i/nEtqhAxFzjtc7Ec6o:GHnVRCyAJKShulPk/GOVHZJcFlc7qUb
Static task
static1
Behavioral task
behavioral1
Sample
b04f17c1d93ca085b43623689be0bbf6eb6d9c725b47293b31054d4195e56c34.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b04f17c1d93ca085b43623689be0bbf6eb6d9c725b47293b31054d4195e56c34.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\_RECoVERY_+nhtbw.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/7EB3C0A1738CE6C
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/7EB3C0A1738CE6C
http://yyre45dbvn2nhbefbmh.begumvelic.at/7EB3C0A1738CE6C
http://xlowfznrg4wf7dli.ONION/7EB3C0A1738CE6C
Targets
-
-
Target
b04f17c1d93ca085b43623689be0bbf6eb6d9c725b47293b31054d4195e56c34
-
Size
420KB
-
MD5
1200f630d960ea698515201af0f0c006
-
SHA1
5ba609358b8526c0378df266aff57b7aa21e3ed9
-
SHA256
b04f17c1d93ca085b43623689be0bbf6eb6d9c725b47293b31054d4195e56c34
-
SHA512
a72aa470f9f4f1ecd22eff01a9e74ca74c03f42f96a6004e330138673b2b52576dfa663ea8671daa6f7ae5f82bf9e7bb931b559540d336263cbf3aa2c8c0178d
-
SSDEEP
6144:ZQHEannVRVHgyA37acHbkwKSvpruDo+sOJDy/GQoyVHi1i/nEtqhAxFzjtc7Ec6o:GHnVRCyAJKShulPk/GOVHZJcFlc7qUb
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-