General
-
Target
343a79b26c6e75390885d535d9c7a40d349766d85e168a06d707b7cf648a3b26
-
Size
276KB
-
Sample
220619-142jqseaep
-
MD5
67b85d3b8258520e2817283ea7a5b174
-
SHA1
c1a7d70469dbf9d0197e53e3081151ed76bdc6c4
-
SHA256
343a79b26c6e75390885d535d9c7a40d349766d85e168a06d707b7cf648a3b26
-
SHA512
d77de08234d8498707c967cdb9a4cda36c81aca814f1a75eac9f6e7defbeacd229d019698d0e64b8ff1befb2ca4e176ccc288508245ab0a0a13a801db8772359
Static task
static1
Behavioral task
behavioral1
Sample
343a79b26c6e75390885d535d9c7a40d349766d85e168a06d707b7cf648a3b26.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
343a79b26c6e75390885d535d9c7a40d349766d85e168a06d707b7cf648a3b26.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+wrcku.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/A76E3A43D4123A5
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/A76E3A43D4123A5
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/A76E3A43D4123A5
http://xlowfznrg4wf7dli.ONION/A76E3A43D4123A5
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+wrcku.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+asvbv.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/6C3C608CAF3C10D1
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/6C3C608CAF3C10D1
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/6C3C608CAF3C10D1
http://xlowfznrg4wf7dli.ONION/6C3C608CAF3C10D1
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+asvbv.html
Targets
-
-
Target
343a79b26c6e75390885d535d9c7a40d349766d85e168a06d707b7cf648a3b26
-
Size
276KB
-
MD5
67b85d3b8258520e2817283ea7a5b174
-
SHA1
c1a7d70469dbf9d0197e53e3081151ed76bdc6c4
-
SHA256
343a79b26c6e75390885d535d9c7a40d349766d85e168a06d707b7cf648a3b26
-
SHA512
d77de08234d8498707c967cdb9a4cda36c81aca814f1a75eac9f6e7defbeacd229d019698d0e64b8ff1befb2ca4e176ccc288508245ab0a0a13a801db8772359
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-