General
-
Target
2b67837484b900f7505d0189a2c5106d8aff81584f99ecaaf7c9ba1c374d59c1
-
Size
366KB
-
Sample
240424-rns3zsbd45
-
MD5
7ed0e30f6e18ef637b3e64065d7a76bd
-
SHA1
c95232e6dc6413fe1967bf5e280fbfbaf6080016
-
SHA256
2b67837484b900f7505d0189a2c5106d8aff81584f99ecaaf7c9ba1c374d59c1
-
SHA512
626a5fc54c4cbf9c747ca9cad6f544dd963153d87fdc1c28e57d7fed3d98f17c17ddf030a2f61a86ebe9528fdc5916acb54e8495df40786484a73ac36821572c
-
SSDEEP
6144:Rul3J09D8rPjOXGzsbH9+ZbO9qX+6xSwEFjrEmXo0ptTla7RfkjCmu7:Rulo8rsHcZZJxSnrEAaZkjCmu7
Static task
static1
Behavioral task
behavioral1
Sample
2b67837484b900f7505d0189a2c5106d8aff81584f99ecaaf7c9ba1c374d59c1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b67837484b900f7505d0189a2c5106d8aff81584f99ecaaf7c9ba1c374d59c1.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+vtdcy.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F91E67D5D968BC8A
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/F91E67D5D968BC8A
http://yyre45dbvn2nhbefbmh.begumvelic.at/F91E67D5D968BC8A
http://xlowfznrg4wf7dli.ONION/F91E67D5D968BC8A
Targets
-
-
Target
2b67837484b900f7505d0189a2c5106d8aff81584f99ecaaf7c9ba1c374d59c1
-
Size
366KB
-
MD5
7ed0e30f6e18ef637b3e64065d7a76bd
-
SHA1
c95232e6dc6413fe1967bf5e280fbfbaf6080016
-
SHA256
2b67837484b900f7505d0189a2c5106d8aff81584f99ecaaf7c9ba1c374d59c1
-
SHA512
626a5fc54c4cbf9c747ca9cad6f544dd963153d87fdc1c28e57d7fed3d98f17c17ddf030a2f61a86ebe9528fdc5916acb54e8495df40786484a73ac36821572c
-
SSDEEP
6144:Rul3J09D8rPjOXGzsbH9+ZbO9qX+6xSwEFjrEmXo0ptTla7RfkjCmu7:Rulo8rsHcZZJxSnrEAaZkjCmu7
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Renames multiple (408) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-