General
-
Target
VirusShare_97ee4e31ab54dd1286221f66882afc62
-
Size
388KB
-
Sample
240610-nykmtahf6t
-
MD5
97ee4e31ab54dd1286221f66882afc62
-
SHA1
ed782ac0c113e6ee1573539927f3374b8c3e859f
-
SHA256
4944771164216ccf6811e327befaa3aea12e9247ff731497a94f3c03d5b1b486
-
SHA512
1e62643409d12493e3e53da846b746496ae55ccd207ae3aebc321744a62717ea8bbe74280ec5d7373a3478ba16bd5763711a002fc8778aaf1a6f068ffd80d1b0
-
SSDEEP
6144:9YMk7V7PQkaYO0iNq/PimTBQNEETJYOo0DldfrvwmjcMVW5OouUI5KtrQ8POyU:9nSdO0iNEPn+TGOoYzwscMSOXUIJ
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_97ee4e31ab54dd1286221f66882afc62.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
VirusShare_97ee4e31ab54dd1286221f66882afc62.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+gayhd.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/B295F9176B0B0D9
http://kkd47eh4hdjshb5t.angortra.at/B295F9176B0B0D9
http://ytrest84y5i456hghadefdsd.pontogrot.com/B295F9176B0B0D9
http://xlowfznrg4wf7dli.ONION/B295F9176B0B0D9
Extracted
C:\Program Files\7-Zip\Lang\Recovery+tengt.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/7B32F5733B9843
http://kkd47eh4hdjshb5t.angortra.at/7B32F5733B9843
http://ytrest84y5i456hghadefdsd.pontogrot.com/7B32F5733B9843
http://xlowfznrg4wf7dli.ONION/7B32F5733B9843
Targets
-
-
Target
VirusShare_97ee4e31ab54dd1286221f66882afc62
-
Size
388KB
-
MD5
97ee4e31ab54dd1286221f66882afc62
-
SHA1
ed782ac0c113e6ee1573539927f3374b8c3e859f
-
SHA256
4944771164216ccf6811e327befaa3aea12e9247ff731497a94f3c03d5b1b486
-
SHA512
1e62643409d12493e3e53da846b746496ae55ccd207ae3aebc321744a62717ea8bbe74280ec5d7373a3478ba16bd5763711a002fc8778aaf1a6f068ffd80d1b0
-
SSDEEP
6144:9YMk7V7PQkaYO0iNq/PimTBQNEETJYOo0DldfrvwmjcMVW5OouUI5KtrQ8POyU:9nSdO0iNEPn+TGOoYzwscMSOXUIJ
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (433) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-