General
-
Target
34aa232cdeecd38244b14bba0dd652f8ad64c2e898435bec800db3a9010e8344
-
Size
425KB
-
Sample
220619-zaay9aeaa5
-
MD5
59c1283c442e45f37f51873452b6ad9d
-
SHA1
1b74ef8114dba9b63f9c45ee7e3af5114422f923
-
SHA256
34aa232cdeecd38244b14bba0dd652f8ad64c2e898435bec800db3a9010e8344
-
SHA512
99651f0bf54286cfcc3d388f6254ec8c78a43652f9b7632af590c4a725a0770799267e546084a0e8e86c1e32b442916c36224d7101f6009f1793bd52025ace7f
Static task
static1
Behavioral task
behavioral1
Sample
34aa232cdeecd38244b14bba0dd652f8ad64c2e898435bec800db3a9010e8344.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
34aa232cdeecd38244b14bba0dd652f8ad64c2e898435bec800db3a9010e8344.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+ufunl.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/23F13DD92D94E761
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/23F13DD92D94E761
http://yyre45dbvn2nhbefbmh.begumvelic.at/23F13DD92D94E761
http://xlowfznrg4wf7dli.ONION/23F13DD92D94E761
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+ufunl.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_RECoVERY_+uxhqf.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/4D64EE26FEF0EAD7
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/4D64EE26FEF0EAD7
http://yyre45dbvn2nhbefbmh.begumvelic.at/4D64EE26FEF0EAD7
http://xlowfznrg4wf7dli.ONION/4D64EE26FEF0EAD7
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_RECoVERY_+uxhqf.html
Targets
-
-
Target
34aa232cdeecd38244b14bba0dd652f8ad64c2e898435bec800db3a9010e8344
-
Size
425KB
-
MD5
59c1283c442e45f37f51873452b6ad9d
-
SHA1
1b74ef8114dba9b63f9c45ee7e3af5114422f923
-
SHA256
34aa232cdeecd38244b14bba0dd652f8ad64c2e898435bec800db3a9010e8344
-
SHA512
99651f0bf54286cfcc3d388f6254ec8c78a43652f9b7632af590c4a725a0770799267e546084a0e8e86c1e32b442916c36224d7101f6009f1793bd52025ace7f
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-