General
-
Target
VirusShare_41c9cf8f98d9cf11e0b101562876d404
-
Size
424KB
-
Sample
240610-nfbbeshd27
-
MD5
41c9cf8f98d9cf11e0b101562876d404
-
SHA1
88a88e498b8e4b73e8585e7994ed519b9ace9610
-
SHA256
bedd09abc5eb323220f26eadbe1ede76373ebd6d8a84fd2884429760b0cd197a
-
SHA512
78c028c126351716c5460f391d810d5925f9ad36eb3a506b0e3d015bcef9b2a0ed9c3fbec9c3f81a5dc362edf64de5eb377da070712ac720d9ea6350da5af113
-
SSDEEP
12288:wL2WjWgDhrhjxaRaDz7z4HMLzskGWoXblCJxfS6:wDXpVx7f7dLoMorOR1
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_41c9cf8f98d9cf11e0b101562876d404.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_41c9cf8f98d9cf11e0b101562876d404.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+kdimu.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/51A574339B46F6BA
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/51A574339B46F6BA
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/51A574339B46F6BA
http://xlowfznrg4wf7dli.ONION/51A574339B46F6BA
Extracted
C:\Program Files\7-Zip\Lang\_RECoVERY_+kfrxg.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/5ABE4B4889768AE0
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/5ABE4B4889768AE0
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/5ABE4B4889768AE0
http://xlowfznrg4wf7dli.ONION/5ABE4B4889768AE0
Targets
-
-
Target
VirusShare_41c9cf8f98d9cf11e0b101562876d404
-
Size
424KB
-
MD5
41c9cf8f98d9cf11e0b101562876d404
-
SHA1
88a88e498b8e4b73e8585e7994ed519b9ace9610
-
SHA256
bedd09abc5eb323220f26eadbe1ede76373ebd6d8a84fd2884429760b0cd197a
-
SHA512
78c028c126351716c5460f391d810d5925f9ad36eb3a506b0e3d015bcef9b2a0ed9c3fbec9c3f81a5dc362edf64de5eb377da070712ac720d9ea6350da5af113
-
SSDEEP
12288:wL2WjWgDhrhjxaRaDz7z4HMLzskGWoXblCJxfS6:wDXpVx7f7dLoMorOR1
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (425) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-