General
-
Target
VirusShare_57b2a1db98a792e2498b6ba5344deb90
-
Size
344KB
-
Sample
240610-nrjryahc91
-
MD5
57b2a1db98a792e2498b6ba5344deb90
-
SHA1
b8a75d237c860f0128eae5adeb7e76f41233fc36
-
SHA256
6950d9f5794147161a7628aedcea38671ee33148580e015cf973f6a86c158d15
-
SHA512
36ebdbc0b27025e9bcc0edbe0cb9b40f2f4f4bbc1582d8e94e42d399a474d45227789d158b7d991fd04424188429fbc00fcf9db06922e3e8abf1506c4aa6d729
-
SSDEEP
6144:FqvsZf39vcCN1RHCfsIltPv6qn0/+sK+x20Im5iTxSO+xUJ:FqIv/wTPv6Q0GwFPxU
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_57b2a1db98a792e2498b6ba5344deb90.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_57b2a1db98a792e2498b6ba5344deb90.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+omppu.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/EF41ECC1484717E
http://tes543berda73i48fsdfsd.keratadze.at/EF41ECC1484717E
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/EF41ECC1484717E
http://xlowfznrg4wf7dli.ONION/EF41ECC1484717E
Extracted
C:\Program Files\7-Zip\Lang\Recovery+bvbrs.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/DF62EF4C258A68A
http://tes543berda73i48fsdfsd.keratadze.at/DF62EF4C258A68A
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/DF62EF4C258A68A
http://xlowfznrg4wf7dli.ONION/DF62EF4C258A68A
Targets
-
-
Target
VirusShare_57b2a1db98a792e2498b6ba5344deb90
-
Size
344KB
-
MD5
57b2a1db98a792e2498b6ba5344deb90
-
SHA1
b8a75d237c860f0128eae5adeb7e76f41233fc36
-
SHA256
6950d9f5794147161a7628aedcea38671ee33148580e015cf973f6a86c158d15
-
SHA512
36ebdbc0b27025e9bcc0edbe0cb9b40f2f4f4bbc1582d8e94e42d399a474d45227789d158b7d991fd04424188429fbc00fcf9db06922e3e8abf1506c4aa6d729
-
SSDEEP
6144:FqvsZf39vcCN1RHCfsIltPv6qn0/+sK+x20Im5iTxSO+xUJ:FqIv/wTPv6Q0GwFPxU
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (417) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-