General
-
Target
aef850273bf6d029b65d8231bd2c82a97cb2778f27cc0b160a7b2e69d2309599
-
Size
243KB
-
Sample
221204-r1vgksha34
-
MD5
809123b31010dd10b62922a9064b0359
-
SHA1
11cf7caf9883b7320bd9cff65382a29b72287eab
-
SHA256
aef850273bf6d029b65d8231bd2c82a97cb2778f27cc0b160a7b2e69d2309599
-
SHA512
a73578897a84c8fbca63acd1b222d51f99e985e117b094bcb4faf349bd9fa00a47ce43b3e6f9f3342c4f7216ce49c421d9b4efa9fe168541ad25d64c370c6b1c
-
SSDEEP
3072:veuwncJzi+g5vINX6ddryONC6VRZsHAOx+9+rgiz9R5Zhzs0NmUAlUa9S/OM90zO:AeoPXVRZX+Shiz9B5dlhGMaffBnASc
Static task
static1
Behavioral task
behavioral1
Sample
aef850273bf6d029b65d8231bd2c82a97cb2778f27cc0b160a7b2e69d2309599.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aef850273bf6d029b65d8231bd2c82a97cb2778f27cc0b160a7b2e69d2309599.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4063495947-34355257-727531523-1000\Recovery+hakeb.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/20727730DB423CB
http://tes543berda73i48fsdfsd.keratadze.at/20727730DB423CB
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/20727730DB423CB
http://xlowfznrg4wf7dli.ONION/20727730DB423CB
Targets
-
-
Target
aef850273bf6d029b65d8231bd2c82a97cb2778f27cc0b160a7b2e69d2309599
-
Size
243KB
-
MD5
809123b31010dd10b62922a9064b0359
-
SHA1
11cf7caf9883b7320bd9cff65382a29b72287eab
-
SHA256
aef850273bf6d029b65d8231bd2c82a97cb2778f27cc0b160a7b2e69d2309599
-
SHA512
a73578897a84c8fbca63acd1b222d51f99e985e117b094bcb4faf349bd9fa00a47ce43b3e6f9f3342c4f7216ce49c421d9b4efa9fe168541ad25d64c370c6b1c
-
SSDEEP
3072:veuwncJzi+g5vINX6ddryONC6VRZsHAOx+9+rgiz9R5Zhzs0NmUAlUa9S/OM90zO:AeoPXVRZX+Shiz9B5dlhGMaffBnASc
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-