General
-
Target
6fde16c735f8a4eca1ea458b8be5829678cd190711e767790deff3584da3e075
-
Size
417KB
-
Sample
240324-z6khkabe3v
-
MD5
4b5a0ad09e1c1be41e96686b718517c9
-
SHA1
17920f56b62b3aabcf1bb0f62e1fa13e975c7934
-
SHA256
6fde16c735f8a4eca1ea458b8be5829678cd190711e767790deff3584da3e075
-
SHA512
cfc6de750cc4fc403c43423c217881b7ca4f6d08ab184f39ec6a72c47ecbc73ed4180d473f521823d6ca2073fb59746ddc9a76119c8abd3704edceca850ead94
-
SSDEEP
12288:51GgBx4Zt4yv7LvA+QsOE1HIpfQS8jTba:iQxs4QLvAskfB8jS
Static task
static1
Behavioral task
behavioral1
Sample
6fde16c735f8a4eca1ea458b8be5829678cd190711e767790deff3584da3e075.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6fde16c735f8a4eca1ea458b8be5829678cd190711e767790deff3584da3e075.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+wujlc.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/34D7D45CF31D1F24
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/34D7D45CF31D1F24
http://yyre45dbvn2nhbefbmh.begumvelic.at/34D7D45CF31D1F24
http://xlowfznrg4wf7dli.ONION/34D7D45CF31D1F24
Extracted
C:\PerfLogs\_RECoVERY_+tqkmh.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/D682E4A7C44627CF
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/D682E4A7C44627CF
http://yyre45dbvn2nhbefbmh.begumvelic.at/D682E4A7C44627CF
http://xlowfznrg4wf7dli.ONION/D682E4A7C44627CF
Targets
-
-
Target
6fde16c735f8a4eca1ea458b8be5829678cd190711e767790deff3584da3e075
-
Size
417KB
-
MD5
4b5a0ad09e1c1be41e96686b718517c9
-
SHA1
17920f56b62b3aabcf1bb0f62e1fa13e975c7934
-
SHA256
6fde16c735f8a4eca1ea458b8be5829678cd190711e767790deff3584da3e075
-
SHA512
cfc6de750cc4fc403c43423c217881b7ca4f6d08ab184f39ec6a72c47ecbc73ed4180d473f521823d6ca2073fb59746ddc9a76119c8abd3704edceca850ead94
-
SSDEEP
12288:51GgBx4Zt4yv7LvA+QsOE1HIpfQS8jTba:iQxs4QLvAskfB8jS
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Renames multiple (312) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-