General
-
Target
VirusShare_8736b31e13bcd6e154dd6ad39b839f8c
-
Size
384KB
-
Sample
240610-nycl7shf4w
-
MD5
8736b31e13bcd6e154dd6ad39b839f8c
-
SHA1
9135b9746cb37636cd26cbcc73ffd0451a34b426
-
SHA256
5207a70e0e818741279d7c25c0d9cb6be136a4fc8ca8fe6f48112c4d0572d64f
-
SHA512
1f8a4ca3b1d33e6208e45c8f42fa1650dd1b97162b499053cc45c034dc87f4d03448a4289d9efbc64bd0e135b7cb597036311dd0f5c763dd6ced6f36ac6a01bf
-
SSDEEP
6144:SeVGON09XRWtlggcMOEqmgWqvANwxcLSgL8J4bAvtqjPtW6wU25vB8ynNd98UW:gON09XotWgOfmgLA8cNYQAojtwU2xnv9
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_8736b31e13bcd6e154dd6ad39b839f8c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_8736b31e13bcd6e154dd6ad39b839f8c.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+iqbsr.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/C741841C63B4E915
http://tes543berda73i48fsdfsd.keratadze.at/C741841C63B4E915
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/C741841C63B4E915
http://xlowfznrg4wf7dli.ONION/C741841C63B4E915
Extracted
C:\Program Files\7-Zip\Lang\Recovery+depjo.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/C9C7A4BB83C2F0C8
http://tes543berda73i48fsdfsd.keratadze.at/C9C7A4BB83C2F0C8
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/C9C7A4BB83C2F0C8
http://xlowfznrg4wf7dli.ONION/C9C7A4BB83C2F0C8
Targets
-
-
Target
VirusShare_8736b31e13bcd6e154dd6ad39b839f8c
-
Size
384KB
-
MD5
8736b31e13bcd6e154dd6ad39b839f8c
-
SHA1
9135b9746cb37636cd26cbcc73ffd0451a34b426
-
SHA256
5207a70e0e818741279d7c25c0d9cb6be136a4fc8ca8fe6f48112c4d0572d64f
-
SHA512
1f8a4ca3b1d33e6208e45c8f42fa1650dd1b97162b499053cc45c034dc87f4d03448a4289d9efbc64bd0e135b7cb597036311dd0f5c763dd6ced6f36ac6a01bf
-
SSDEEP
6144:SeVGON09XRWtlggcMOEqmgWqvANwxcLSgL8J4bAvtqjPtW6wU25vB8ynNd98UW:gON09XotWgOfmgLA8cNYQAojtwU2xnv9
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (420) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-