General
-
Target
cb28c211ca8292894f3eef43ce5a6cd4.bin
-
Size
122KB
-
Sample
230410-b96cfaee59
-
MD5
c9f4d97ae61ccc670d3804ec4970146c
-
SHA1
5a7857be62626661c02e92c33f71eca38f27d2ad
-
SHA256
0d8bc17c404ab29dfcf670c90d29a695d49f7d437b6d84ee1478c7f4121dbda7
-
SHA512
d43a8ac76ee04622de18a78391569223eb498aaa43b72fb245fa5f4ed182abd27168bfe48232dc23decf18cf5fd992eefb38887096b5d45bf89753926621037f
-
SSDEEP
3072:xg5QClwlWU38JzXX3Xkr5qSlF0ziq50mCUR0fuMXLVC:xgaC3jJzn+5X0+q5nCUR0fTVC
Static task
static1
Behavioral task
behavioral1
Sample
87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+xbsgq.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/334F503A21D7CA22
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/334F503A21D7CA22
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/334F503A21D7CA22
http://xlowfznrg4wf7dli.ONION/334F503A21D7CA22
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\_RECoVERY_+xbsgq.html
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/334F503A21D7CA22
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/334F503A21D7CA22
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/334F503A21D7CA22
http://xlowfznrg4wf7dli.onion/334F503A21D7CA22
Extracted
C:\PerfLogs\_RECoVERY_+hvbkb.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/BE3D20CD9E77937F
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/BE3D20CD9E77937F
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/BE3D20CD9E77937F
http://xlowfznrg4wf7dli.ONION/BE3D20CD9E77937F
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\_RECoVERY_+hvbkb.html
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/BE3D20CD9E77937F
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/BE3D20CD9E77937F
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/BE3D20CD9E77937F
http://xlowfznrg4wf7dli.onion/BE3D20CD9E77937F
Targets
-
-
Target
87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d.exe
-
Size
692KB
-
MD5
cb28c211ca8292894f3eef43ce5a6cd4
-
SHA1
70e0bc5fce5534e6dbe5200d9c965c925b596ee3
-
SHA256
87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d
-
SHA512
b56c612e389f7b58218a2e66a66bddea55425ed5f99a22921e2a16b2a65ca415f0dc39fbe7c88fffe082ab4bc27923dcea652396cc922d06fd82baea76b356bd
-
SSDEEP
3072:UkmGgnjAYn2Fj5ohpzBovjtALLXOixtjOQ0hV09ZIR5YkHk7wELOhr1DwTTRpAe:g6mLD1OQW094YkHk7wsO7wPXAe
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-