General
-
Target
198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a
-
Size
335KB
-
Sample
220608-gw14fsged5
-
MD5
3e63efdd493c52fdfff9b66d1a161197
-
SHA1
f1012aac50a8c491e51a023676d727aedf3fcc63
-
SHA256
198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a
-
SHA512
49de421d97567b1df8479f5b8af5e4532fc83fdb95a8213bb4035e5f62e8ef4b2f38fe8951929c3a493f408edb944b3093b6207aab8fd3e6028fc8b5d48109d2
Static task
static1
Behavioral task
behavioral1
Sample
198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+rrutw.txt
http://t54ndnku456ngkwsudqer.wallymac.com/A0BCF6AD7FEB3860
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/A0BCF6AD7FEB3860
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/A0BCF6AD7FEB3860
http://xlowfznrg4wf7dli.onion/A0BCF6AD7FEB3860
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+rrutw.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1081944012-3634099177-1681222835-1000\_ReCoVeRy_+ciunm.txt
http://t54ndnku456ngkwsudqer.wallymac.com/45D0EE47512B3F88
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/45D0EE47512B3F88
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/45D0EE47512B3F88
http://xlowfznrg4wf7dli.onion/45D0EE47512B3F88
Extracted
C:\$Recycle.Bin\S-1-5-21-1081944012-3634099177-1681222835-1000\_ReCoVeRy_+ciunm.html
Targets
-
-
Target
198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a
-
Size
335KB
-
MD5
3e63efdd493c52fdfff9b66d1a161197
-
SHA1
f1012aac50a8c491e51a023676d727aedf3fcc63
-
SHA256
198e4e9827b352efc07c4369ba5f3777110ba484da8fce52dd50bfdcda6d9b1a
-
SHA512
49de421d97567b1df8479f5b8af5e4532fc83fdb95a8213bb4035e5f62e8ef4b2f38fe8951929c3a493f408edb944b3093b6207aab8fd3e6028fc8b5d48109d2
Score10/10-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-