Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
2025-03-22_e24753999a765babb180217ea49affa1_amadey_teslacrypt
-
Size
251KB
-
Sample
250322-kd8blavkw2
-
MD5
e24753999a765babb180217ea49affa1
-
SHA1
7a5f87c0a78d6c20d7b7e35569eb30224b507908
-
SHA256
2726d7000a2c36a93b6bf336314628b1a8571c2365b36cd8df899f2fc156975e
-
SHA512
173de2f5afd1f5dfa376926bbe34ede5c06f3dc601e8b3fbbe7ba5612e3003f9747c5ab9d99bbb948cc270d03aa3b2ca520cd57af11e550e3a336180292d37df
-
SSDEEP
3072:yP36YQgDABWbDFp7yz5hwXZwnt+XOCGNjYQohl5ZieMhJP7p9ie3ESTRpA6:OZyTntxVYQE5ehJP7p9p3EcXA6
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-22_e24753999a765babb180217ea49affa1_amadey_teslacrypt.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-22_e24753999a765babb180217ea49affa1_amadey_teslacrypt.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+jojts.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/941475D36FDDEFE
http://tes543berda73i48fsdfsd.keratadze.at/941475D36FDDEFE
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/941475D36FDDEFE
http://xlowfznrg4wf7dli.ONION/941475D36FDDEFE
Extracted
C:\Users\Recovery+vgxfx.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/32A7241F51FA1B9
http://tes543berda73i48fsdfsd.keratadze.at/32A7241F51FA1B9
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/32A7241F51FA1B9
http://xlowfznrg4wf7dli.ONION/32A7241F51FA1B9
Targets
-
-
Target
2025-03-22_e24753999a765babb180217ea49affa1_amadey_teslacrypt
-
Size
251KB
-
MD5
e24753999a765babb180217ea49affa1
-
SHA1
7a5f87c0a78d6c20d7b7e35569eb30224b507908
-
SHA256
2726d7000a2c36a93b6bf336314628b1a8571c2365b36cd8df899f2fc156975e
-
SHA512
173de2f5afd1f5dfa376926bbe34ede5c06f3dc601e8b3fbbe7ba5612e3003f9747c5ab9d99bbb948cc270d03aa3b2ca520cd57af11e550e3a336180292d37df
-
SSDEEP
3072:yP36YQgDABWbDFp7yz5hwXZwnt+XOCGNjYQohl5ZieMhJP7p9ie3ESTRpA6:OZyTntxVYQE5ehJP7p9p3EcXA6
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (432) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
2File Deletion
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1