General
-
Target
34173bc42e9ced90b88c99f99f9510fb48d275f29c7109f7477a4748518f5226
-
Size
330KB
-
Sample
220619-2se22ahdc4
-
MD5
316de26ede86215a1e7376a943d851e7
-
SHA1
30e08eefafcf241a0578af6b45f69497b2d690fd
-
SHA256
34173bc42e9ced90b88c99f99f9510fb48d275f29c7109f7477a4748518f5226
-
SHA512
99e738b0b591f2de5fc3656deaf87f7c09cfa3dfa9e8c34699f0566b6f7a11e6400bf41d0163b572d4f77d1960a57120a74f4c69e91a1c2ffef5fae707e0b402
Static task
static1
Behavioral task
behavioral1
Sample
34173bc42e9ced90b88c99f99f9510fb48d275f29c7109f7477a4748518f5226.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
34173bc42e9ced90b88c99f99f9510fb48d275f29c7109f7477a4748518f5226.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+cxvig.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/1926DECB68FFAA75
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/1926DECB68FFAA75
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/1926DECB68FFAA75
http://xlowfznrg4wf7dli.ONION/1926DECB68FFAA75
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+cxvig.html
Targets
-
-
Target
34173bc42e9ced90b88c99f99f9510fb48d275f29c7109f7477a4748518f5226
-
Size
330KB
-
MD5
316de26ede86215a1e7376a943d851e7
-
SHA1
30e08eefafcf241a0578af6b45f69497b2d690fd
-
SHA256
34173bc42e9ced90b88c99f99f9510fb48d275f29c7109f7477a4748518f5226
-
SHA512
99e738b0b591f2de5fc3656deaf87f7c09cfa3dfa9e8c34699f0566b6f7a11e6400bf41d0163b572d4f77d1960a57120a74f4c69e91a1c2ffef5fae707e0b402
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-