General
-
Target
29c86c8056fdf13a6465e4d2f79b9068c8b3c2576fa501fbdb1b124a1e7d7719
-
Size
388KB
-
Sample
220615-qfs8caahc6
-
MD5
2c96c40e42a735d620bd12b6ed032e15
-
SHA1
3b43cf4dd9f032f9f646e34e90a18e962aabf511
-
SHA256
29c86c8056fdf13a6465e4d2f79b9068c8b3c2576fa501fbdb1b124a1e7d7719
-
SHA512
64e66627dc588ccdd28cb77ea700b4cbc55fab17837d8b7c9149804f55af4d87d9e593afa445ffa0f72231fbe0b86c2c07647a69ff0f3f1eda36c65df7d1eec9
Static task
static1
Behavioral task
behavioral1
Sample
29c86c8056fdf13a6465e4d2f79b9068c8b3c2576fa501fbdb1b124a1e7d7719.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
29c86c8056fdf13a6465e4d2f79b9068c8b3c2576fa501fbdb1b124a1e7d7719.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\Recovery+bjufy.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/C1408D22119BA3D
http://kkd47eh4hdjshb5t.angortra.at/C1408D22119BA3D
http://ytrest84y5i456hghadefdsd.pontogrot.com/C1408D22119BA3D
http://xlowfznrg4wf7dli.ONION/C1408D22119BA3D
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\Recovery+qcirq.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/E7BAD879AC8544
http://kkd47eh4hdjshb5t.angortra.at/E7BAD879AC8544
http://ytrest84y5i456hghadefdsd.pontogrot.com/E7BAD879AC8544
http://xlowfznrg4wf7dli.ONION/E7BAD879AC8544
Targets
-
-
Target
29c86c8056fdf13a6465e4d2f79b9068c8b3c2576fa501fbdb1b124a1e7d7719
-
Size
388KB
-
MD5
2c96c40e42a735d620bd12b6ed032e15
-
SHA1
3b43cf4dd9f032f9f646e34e90a18e962aabf511
-
SHA256
29c86c8056fdf13a6465e4d2f79b9068c8b3c2576fa501fbdb1b124a1e7d7719
-
SHA512
64e66627dc588ccdd28cb77ea700b4cbc55fab17837d8b7c9149804f55af4d87d9e593afa445ffa0f72231fbe0b86c2c07647a69ff0f3f1eda36c65df7d1eec9
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-