General
-
Target
VirusShare_27e887aa14f3890a72f06ec5d0759f20
-
Size
388KB
-
Sample
240610-mv1zysgg68
-
MD5
27e887aa14f3890a72f06ec5d0759f20
-
SHA1
8bacf22533725fd98c254c8eb6852edbe225a0ef
-
SHA256
91a23ebd232c1d96458e3b0870ec5507e547e6763bf99c5c7ca69a89e2a51267
-
SHA512
56f420069c68e971069ef6d25a5944d50901d8c9de84f57a1bdb49371cfca117855afd4a6aecf1c6df96369ca3d19fe655c5a939a8b66d6fff6341de97259089
-
SSDEEP
12288:LhTjRwlkwFrnAEryLFcG3yBrZTRDgZ8zOhG6:F4DRw7325gPh
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_27e887aa14f3890a72f06ec5d0759f20.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
VirusShare_27e887aa14f3890a72f06ec5d0759f20.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+ujerx.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/4E38C8C18A7A6CBA
http://kkd47eh4hdjshb5t.angortra.at/4E38C8C18A7A6CBA
http://ytrest84y5i456hghadefdsd.pontogrot.com/4E38C8C18A7A6CBA
http://xlowfznrg4wf7dli.ONION/4E38C8C18A7A6CBA
Extracted
C:\Program Files\7-Zip\Lang\Recovery+jexdc.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/6246099CAC3E040
http://kkd47eh4hdjshb5t.angortra.at/6246099CAC3E040
http://ytrest84y5i456hghadefdsd.pontogrot.com/6246099CAC3E040
http://xlowfznrg4wf7dli.ONION/6246099CAC3E040
Targets
-
-
Target
VirusShare_27e887aa14f3890a72f06ec5d0759f20
-
Size
388KB
-
MD5
27e887aa14f3890a72f06ec5d0759f20
-
SHA1
8bacf22533725fd98c254c8eb6852edbe225a0ef
-
SHA256
91a23ebd232c1d96458e3b0870ec5507e547e6763bf99c5c7ca69a89e2a51267
-
SHA512
56f420069c68e971069ef6d25a5944d50901d8c9de84f57a1bdb49371cfca117855afd4a6aecf1c6df96369ca3d19fe655c5a939a8b66d6fff6341de97259089
-
SSDEEP
12288:LhTjRwlkwFrnAEryLFcG3yBrZTRDgZ8zOhG6:F4DRw7325gPh
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (405) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-