General
-
Target
147a7c44dba7bd1304d2d3282aff8f538f974bea35dd3070ad4a39ca31277a33
-
Size
339KB
-
Sample
220602-zqy11sfdej
-
MD5
93585e0122228d189220839b9076f0e4
-
SHA1
0a05412fa17e2e0317c28a804ed4cd6247db4495
-
SHA256
147a7c44dba7bd1304d2d3282aff8f538f974bea35dd3070ad4a39ca31277a33
-
SHA512
185b89727170d2025b90b7764829598909b25563bc5d6245ac77bd31124d8f3a99f028112a7ea87248c5ff321ee8664c071ce0bf0c315b30e76db037d03a064c
Static task
static1
Behavioral task
behavioral1
Sample
147a7c44dba7bd1304d2d3282aff8f538f974bea35dd3070ad4a39ca31277a33.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
147a7c44dba7bd1304d2d3282aff8f538f974bea35dd3070ad4a39ca31277a33.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\_ReCoVeRy_+pangg.txt
http://t54ndnku456ngkwsudqer.wallymac.com/CF2EFB54F96952CB
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/CF2EFB54F96952CB
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/CF2EFB54F96952CB
http://xlowfznrg4wf7dli.onion/CF2EFB54F96952CB
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\_ReCoVeRy_+pangg.html
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_ReCoVeRy_+gccrl.txt
http://t54ndnku456ngkwsudqer.wallymac.com/69ED2EAA547805D
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/69ED2EAA547805D
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/69ED2EAA547805D
http://xlowfznrg4wf7dli.onion/69ED2EAA547805D
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_ReCoVeRy_+gccrl.html
Targets
-
-
Target
147a7c44dba7bd1304d2d3282aff8f538f974bea35dd3070ad4a39ca31277a33
-
Size
339KB
-
MD5
93585e0122228d189220839b9076f0e4
-
SHA1
0a05412fa17e2e0317c28a804ed4cd6247db4495
-
SHA256
147a7c44dba7bd1304d2d3282aff8f538f974bea35dd3070ad4a39ca31277a33
-
SHA512
185b89727170d2025b90b7764829598909b25563bc5d6245ac77bd31124d8f3a99f028112a7ea87248c5ff321ee8664c071ce0bf0c315b30e76db037d03a064c
Score10/10-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-