General
-
Target
VirusShare_1fe6fdfb7796bf1ec5bdf80f86fa9dc5
-
Size
388KB
-
Sample
240610-mtmqyagg48
-
MD5
1fe6fdfb7796bf1ec5bdf80f86fa9dc5
-
SHA1
c4f86755ca60567fedc3a05ce88c4a342219c8b4
-
SHA256
a878058e1c857a46a565cd950a6e26c2b6d30fca17ef97efb7488625c326aaba
-
SHA512
22cfa91dfb8f8a885932b269202b4e68da7b94316213f47729b3fc2a10050e7629abe310ffa583ca1211b54dbbc37b040f76442c1c2e774a6dfd79e3fd80d9b6
-
SSDEEP
6144:nYMk7V7PQkaYO0iNq/PimTBQNEETJYOo0DldfrvwmjcMVW5OouUI5KtrQ8POyU:nnSdO0iNEPn+TGOoYzwscMSOXUIJ
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_1fe6fdfb7796bf1ec5bdf80f86fa9dc5.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_1fe6fdfb7796bf1ec5bdf80f86fa9dc5.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+qkllx.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/95ED5414483264D5
http://kkd47eh4hdjshb5t.angortra.at/95ED5414483264D5
http://ytrest84y5i456hghadefdsd.pontogrot.com/95ED5414483264D5
http://xlowfznrg4wf7dli.ONION/95ED5414483264D5
Extracted
C:\Program Files\7-Zip\Lang\Recovery+jukwp.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/76C373CAFA1A49BA
http://kkd47eh4hdjshb5t.angortra.at/76C373CAFA1A49BA
http://ytrest84y5i456hghadefdsd.pontogrot.com/76C373CAFA1A49BA
http://xlowfznrg4wf7dli.ONION/76C373CAFA1A49BA
Targets
-
-
Target
VirusShare_1fe6fdfb7796bf1ec5bdf80f86fa9dc5
-
Size
388KB
-
MD5
1fe6fdfb7796bf1ec5bdf80f86fa9dc5
-
SHA1
c4f86755ca60567fedc3a05ce88c4a342219c8b4
-
SHA256
a878058e1c857a46a565cd950a6e26c2b6d30fca17ef97efb7488625c326aaba
-
SHA512
22cfa91dfb8f8a885932b269202b4e68da7b94316213f47729b3fc2a10050e7629abe310ffa583ca1211b54dbbc37b040f76442c1c2e774a6dfd79e3fd80d9b6
-
SSDEEP
6144:nYMk7V7PQkaYO0iNq/PimTBQNEETJYOo0DldfrvwmjcMVW5OouUI5KtrQ8POyU:nnSdO0iNEPn+TGOoYzwscMSOXUIJ
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (416) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-