General
-
Target
2024-09-16_5acb7cef68bd76c0cae3d8b06472e0b3_teslacrypt
-
Size
251KB
-
Sample
240916-tynblaxenf
-
MD5
5acb7cef68bd76c0cae3d8b06472e0b3
-
SHA1
4e38bc3beaf8d90f11203dbd35ec6b77be1b7606
-
SHA256
c12d55931b5e6cec59ec102c20171ffda7c2dba4c7d4242ba2bded64cef377e7
-
SHA512
0a745230ca22c0f6eea6872610d442ca34f6999ba08f07d9308bca995c890f3e02814553fff509ed09ddc6520e5c144c65f971d49fbe5e774dda0373c1f4eb1b
-
SSDEEP
3072:PLhtgSlZAeKoNhbKIVzq5JRpLXOOvDaUwkDYnp4U+0mQccFNfxvblzajFKTRprr:D8BRpdDaUPYnfzmQccFNfBxvXrr
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-16_5acb7cef68bd76c0cae3d8b06472e0b3_teslacrypt.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-16_5acb7cef68bd76c0cae3d8b06472e0b3_teslacrypt.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ilvnk.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/D9362BFCEDBCE6D6
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/D9362BFCEDBCE6D6
http://yyre45dbvn2nhbefbmh.begumvelic.at/D9362BFCEDBCE6D6
http://xlowfznrg4wf7dli.ONION/D9362BFCEDBCE6D6
Extracted
C:\Program Files\7-Zip\Lang\_ReCoVeRy_+djivk.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/1BD4498FF78F83D2
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/1BD4498FF78F83D2
http://yyre45dbvn2nhbefbmh.begumvelic.at/1BD4498FF78F83D2
http://xlowfznrg4wf7dli.ONION/1BD4498FF78F83D2
Targets
-
-
Target
2024-09-16_5acb7cef68bd76c0cae3d8b06472e0b3_teslacrypt
-
Size
251KB
-
MD5
5acb7cef68bd76c0cae3d8b06472e0b3
-
SHA1
4e38bc3beaf8d90f11203dbd35ec6b77be1b7606
-
SHA256
c12d55931b5e6cec59ec102c20171ffda7c2dba4c7d4242ba2bded64cef377e7
-
SHA512
0a745230ca22c0f6eea6872610d442ca34f6999ba08f07d9308bca995c890f3e02814553fff509ed09ddc6520e5c144c65f971d49fbe5e774dda0373c1f4eb1b
-
SSDEEP
3072:PLhtgSlZAeKoNhbKIVzq5JRpLXOOvDaUwkDYnp4U+0mQccFNfxvblzajFKTRprr:D8BRpdDaUPYnfzmQccFNfBxvXrr
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (417) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-