General
-
Target
af1150b6bc76db56a05401c3b6dcb5ec5bef272f0dca74725a7618126f4e4e6e
-
Size
380KB
-
Sample
221204-q44nzsea55
-
MD5
09d90808ed7d4e9e7738fead37273b54
-
SHA1
17fff1085882a35f656515805bde691da1730c08
-
SHA256
af1150b6bc76db56a05401c3b6dcb5ec5bef272f0dca74725a7618126f4e4e6e
-
SHA512
e29879105ceaa1a04d3498c495df8c699512626ffd9243216bbb98d653a9c3ad013ad79fa2a86767b671427fa62a55c82c54033ef70581d9f7eb6c86cea33ac4
-
SSDEEP
6144:DjNn/yINdVCIlr7m7H6+OWiWlAam4REDEAAYVKeYfqzDyGKM9bifvDNWT5kwhQWw:HU8exTIWlKiEDkveYfqzHw7IT5kwKWce
Static task
static1
Behavioral task
behavioral1
Sample
af1150b6bc76db56a05401c3b6dcb5ec5bef272f0dca74725a7618126f4e4e6e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af1150b6bc76db56a05401c3b6dcb5ec5bef272f0dca74725a7618126f4e4e6e.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2292972927-2705560509-2768824231-1000\Recovery+icviv.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/57259E3AB0677E6B
http://tes543berda73i48fsdfsd.keratadze.at/57259E3AB0677E6B
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/57259E3AB0677E6B
http://xlowfznrg4wf7dli.ONION/57259E3AB0677E6B
Extracted
C:\$Recycle.Bin\S-1-5-21-2629973501-4017243118-3254762364-1000\Recovery+wtgqu.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/458DBF1AE2DBA9F
http://tes543berda73i48fsdfsd.keratadze.at/458DBF1AE2DBA9F
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/458DBF1AE2DBA9F
http://xlowfznrg4wf7dli.ONION/458DBF1AE2DBA9F
Targets
-
-
Target
af1150b6bc76db56a05401c3b6dcb5ec5bef272f0dca74725a7618126f4e4e6e
-
Size
380KB
-
MD5
09d90808ed7d4e9e7738fead37273b54
-
SHA1
17fff1085882a35f656515805bde691da1730c08
-
SHA256
af1150b6bc76db56a05401c3b6dcb5ec5bef272f0dca74725a7618126f4e4e6e
-
SHA512
e29879105ceaa1a04d3498c495df8c699512626ffd9243216bbb98d653a9c3ad013ad79fa2a86767b671427fa62a55c82c54033ef70581d9f7eb6c86cea33ac4
-
SSDEEP
6144:DjNn/yINdVCIlr7m7H6+OWiWlAam4REDEAAYVKeYfqzDyGKM9bifvDNWT5kwhQWw:HU8exTIWlKiEDkveYfqzHw7IT5kwKWce
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-