General
-
Target
2023-04-07_cb28c211ca8292894f3eef43ce5a6cd4_teslacrypt.exe
-
Size
692KB
-
Sample
230408-wm15esee46
-
MD5
cb28c211ca8292894f3eef43ce5a6cd4
-
SHA1
70e0bc5fce5534e6dbe5200d9c965c925b596ee3
-
SHA256
87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d
-
SHA512
b56c612e389f7b58218a2e66a66bddea55425ed5f99a22921e2a16b2a65ca415f0dc39fbe7c88fffe082ab4bc27923dcea652396cc922d06fd82baea76b356bd
-
SSDEEP
3072:UkmGgnjAYn2Fj5ohpzBovjtALLXOixtjOQ0hV09ZIR5YkHk7wELOhr1DwTTRpAe:g6mLD1OQW094YkHk7wsO7wPXAe
Static task
static1
Behavioral task
behavioral1
Sample
2023-04-07_cb28c211ca8292894f3eef43ce5a6cd4_teslacrypt.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2023-04-07_cb28c211ca8292894f3eef43ce5a6cd4_teslacrypt.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+cldyi.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/98A14FEFBC432DA5
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/98A14FEFBC432DA5
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/98A14FEFBC432DA5
http://xlowfznrg4wf7dli.ONION/98A14FEFBC432DA5
Extracted
C:\PerfLogs\_RECoVERY_+xcdby.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/E04AB970D8936378
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/E04AB970D8936378
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/E04AB970D8936378
http://xlowfznrg4wf7dli.ONION/E04AB970D8936378
Targets
-
-
Target
2023-04-07_cb28c211ca8292894f3eef43ce5a6cd4_teslacrypt.exe
-
Size
692KB
-
MD5
cb28c211ca8292894f3eef43ce5a6cd4
-
SHA1
70e0bc5fce5534e6dbe5200d9c965c925b596ee3
-
SHA256
87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d
-
SHA512
b56c612e389f7b58218a2e66a66bddea55425ed5f99a22921e2a16b2a65ca415f0dc39fbe7c88fffe082ab4bc27923dcea652396cc922d06fd82baea76b356bd
-
SSDEEP
3072:UkmGgnjAYn2Fj5ohpzBovjtALLXOixtjOQ0hV09ZIR5YkHk7wELOhr1DwTTRpAe:g6mLD1OQW094YkHk7wsO7wPXAe
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-