General
-
Target
VirusShare_40707cdcd4220213b9ef2545043d6c99
-
Size
388KB
-
Sample
240610-ner8jshc95
-
MD5
40707cdcd4220213b9ef2545043d6c99
-
SHA1
7f9d3ad1125de47368644e29b5d5cd515c6497e8
-
SHA256
6f7c7b4f3bd9e6ce0dc0d4dd7662e35d8a2079dfe61b2febf2645b68fe11ee3f
-
SHA512
0a3cda582f1a444ad78d5f09d4e204a753c74863bcbbbdf5c6ffcafa523b195ac4c6aa7922973cf2687b673e4e346f94b6525402db7380a4e53c3f8855480088
-
SSDEEP
6144:tYMk7V7PQkaYO0iNq/PimTBQNEETJYOo0DldfrvwmjcMVW5OouUI5KtrQ8POyU:tnSdO0iNEPn+TGOoYzwscMSOXUIJ
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_40707cdcd4220213b9ef2545043d6c99.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
VirusShare_40707cdcd4220213b9ef2545043d6c99.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+iqbsr.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/9B913E7578B55386
http://kkd47eh4hdjshb5t.angortra.at/9B913E7578B55386
http://ytrest84y5i456hghadefdsd.pontogrot.com/9B913E7578B55386
http://xlowfznrg4wf7dli.ONION/9B913E7578B55386
Extracted
C:\Program Files\7-Zip\Lang\Recovery+xayru.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/8A3762341DD7EB3E
http://kkd47eh4hdjshb5t.angortra.at/8A3762341DD7EB3E
http://ytrest84y5i456hghadefdsd.pontogrot.com/8A3762341DD7EB3E
http://xlowfznrg4wf7dli.ONION/8A3762341DD7EB3E
Targets
-
-
Target
VirusShare_40707cdcd4220213b9ef2545043d6c99
-
Size
388KB
-
MD5
40707cdcd4220213b9ef2545043d6c99
-
SHA1
7f9d3ad1125de47368644e29b5d5cd515c6497e8
-
SHA256
6f7c7b4f3bd9e6ce0dc0d4dd7662e35d8a2079dfe61b2febf2645b68fe11ee3f
-
SHA512
0a3cda582f1a444ad78d5f09d4e204a753c74863bcbbbdf5c6ffcafa523b195ac4c6aa7922973cf2687b673e4e346f94b6525402db7380a4e53c3f8855480088
-
SSDEEP
6144:tYMk7V7PQkaYO0iNq/PimTBQNEETJYOo0DldfrvwmjcMVW5OouUI5KtrQ8POyU:tnSdO0iNEPn+TGOoYzwscMSOXUIJ
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (424) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-