General
-
Target
2023-12-12_e7269b14789d8e615e42e3b62d59be36_teslacrypt
-
Size
256KB
-
Sample
231216-fsqmwaaedj
-
MD5
e7269b14789d8e615e42e3b62d59be36
-
SHA1
4051f1f1ef40cfe440b280495dafd37dc2332bb9
-
SHA256
4e7ebafd70b51016204a8352a383a06f10d54f43a9b351ae693037dd33807078
-
SHA512
2a4f771ab747492af6c21a83ec40e36439c804c1885ccea3e3d9c69c20fa82f48e3f73b4fd34d0d8114c88851d295631131a3e059569bcecdd8972ebff50a12a
-
SSDEEP
3072:sP36YQgDABWbDFp7yz5dwjtYjt+XOCGNjYQMhLwZil6hdZrz5eLbJnCgo5QTRpA:IZKjjtxVYQuwFhdZrz5eXC5aXA
Static task
static1
Behavioral task
behavioral1
Sample
2023-12-12_e7269b14789d8e615e42e3b62d59be36_teslacrypt.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2023-12-12_e7269b14789d8e615e42e3b62d59be36_teslacrypt.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+cruby.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/90B7487EB6C8E85B
http://tes543berda73i48fsdfsd.keratadze.at/90B7487EB6C8E85B
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/90B7487EB6C8E85B
http://xlowfznrg4wf7dli.ONION/90B7487EB6C8E85B
Extracted
C:\PerfLogs\_RECOVERY_+txpyd.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/AAF81CBB392E8D1
http://tes543berda73i48fsdfsd.keratadze.at/AAF81CBB392E8D1
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/AAF81CBB392E8D1
http://xlowfznrg4wf7dli.ONION/AAF81CBB392E8D1
Targets
-
-
Target
2023-12-12_e7269b14789d8e615e42e3b62d59be36_teslacrypt
-
Size
256KB
-
MD5
e7269b14789d8e615e42e3b62d59be36
-
SHA1
4051f1f1ef40cfe440b280495dafd37dc2332bb9
-
SHA256
4e7ebafd70b51016204a8352a383a06f10d54f43a9b351ae693037dd33807078
-
SHA512
2a4f771ab747492af6c21a83ec40e36439c804c1885ccea3e3d9c69c20fa82f48e3f73b4fd34d0d8114c88851d295631131a3e059569bcecdd8972ebff50a12a
-
SSDEEP
3072:sP36YQgDABWbDFp7yz5dwjtYjt+XOCGNjYQMhLwZil6hdZrz5eLbJnCgo5QTRpA:IZKjjtxVYQuwFhdZrz5eXC5aXA
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Renames multiple (422) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-