General
-
Target
33e6272f8a84de06327c40ad72efd8537c82d5f9d86b082ef1f6cfe7031f7c3b
-
Size
364KB
-
Sample
220619-3qw37sgbbn
-
MD5
2b5c64d0ae335be2b30de30ed5cf9b71
-
SHA1
57a809107f1810a3ed01d4baf09f89a1fb562757
-
SHA256
33e6272f8a84de06327c40ad72efd8537c82d5f9d86b082ef1f6cfe7031f7c3b
-
SHA512
96ebf2562a60ef245aea06decf83298979368e4c4dabaa107068e430d7fe86af5f996cfffba95e7f1c5ef411e7d1265d24a84716be63eaedfd48ad3aac4dc4e8
Static task
static1
Behavioral task
behavioral1
Sample
33e6272f8a84de06327c40ad72efd8537c82d5f9d86b082ef1f6cfe7031f7c3b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
33e6272f8a84de06327c40ad72efd8537c82d5f9d86b082ef1f6cfe7031f7c3b.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_ReCoVeRy_+kamjw.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/41CCFD45AC241FDA
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/41CCFD45AC241FDA
http://yyre45dbvn2nhbefbmh.begumvelic.at/41CCFD45AC241FDA
http://xlowfznrg4wf7dli.ONION/41CCFD45AC241FDA
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_ReCoVeRy_+kamjw.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1081944012-3634099177-1681222835-1000\_ReCoVeRy_+ttxfc.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/467AEE3CCAB4AF13
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/467AEE3CCAB4AF13
http://yyre45dbvn2nhbefbmh.begumvelic.at/467AEE3CCAB4AF13
http://xlowfznrg4wf7dli.ONION/467AEE3CCAB4AF13
Extracted
C:\$Recycle.Bin\S-1-5-21-1081944012-3634099177-1681222835-1000\_ReCoVeRy_+ttxfc.html
Targets
-
-
Target
33e6272f8a84de06327c40ad72efd8537c82d5f9d86b082ef1f6cfe7031f7c3b
-
Size
364KB
-
MD5
2b5c64d0ae335be2b30de30ed5cf9b71
-
SHA1
57a809107f1810a3ed01d4baf09f89a1fb562757
-
SHA256
33e6272f8a84de06327c40ad72efd8537c82d5f9d86b082ef1f6cfe7031f7c3b
-
SHA512
96ebf2562a60ef245aea06decf83298979368e4c4dabaa107068e430d7fe86af5f996cfffba95e7f1c5ef411e7d1265d24a84716be63eaedfd48ad3aac4dc4e8
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-