Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

TeslaCrypt: Latest Version is 2.1.0a


  • Please log in to reply
1 reply to this topic

#1 White Hat Mike

White Hat Mike

  • Members
  • 312 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:::1
  • Local time:06:36 PM

Posted 27 October 2015 - 09:31 PM

Didn't analyze it myself yet, but a few things to note...
 
2nd stage payload it drops: "kdrmi-a.exe"
 
Ransom note files:
  • HOWTO_RESTORE_FILES.txt
  • HOWTO_RESTORE_FILES.htm
  • HOWTO_RESTORE_FILES.bmp
http://malware-traffic-analysis.net/2015/10/27/index.html

Information Security Engineer | Penetration Tester | Forensic Analyst

CipherTechs.com


BC AdBot (Login to Remove)

 


#2 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,683 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:36 PM

Posted 28 October 2015 - 07:49 AM

2nd stage payload it drops: "kdrmi-a.exe"


Is that a static name so it's always the same?

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users