General
-
Target
317f0f29c592d238088f22ca8e1e794078c1a3f060700b8b94ced7919f66c214
-
Size
314KB
-
Sample
220620-2d5zxaebc5
-
MD5
2e35cb5dee05f2e5fdcb98ad97a8d007
-
SHA1
3ea08ef7a0dc32173e6240a4ce4fb17f7cdb2005
-
SHA256
317f0f29c592d238088f22ca8e1e794078c1a3f060700b8b94ced7919f66c214
-
SHA512
cc284f0989aac6de90274fddcc64b9b00c2b31a83d75bd82ceae4ced17f8e45a415ba12e6d0e3268ee4834026d47e3df4f7b7b4adb5b2d34d2382407d5887bda
Static task
static1
Behavioral task
behavioral1
Sample
317f0f29c592d238088f22ca8e1e794078c1a3f060700b8b94ced7919f66c214.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
317f0f29c592d238088f22ca8e1e794078c1a3f060700b8b94ced7919f66c214.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_RECoVERY_+uwsdo.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/EB20B6FA4EC3E95
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/EB20B6FA4EC3E95
http://yyre45dbvn2nhbefbmh.begumvelic.at/EB20B6FA4EC3E95
http://xlowfznrg4wf7dli.ONION/EB20B6FA4EC3E95
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_RECoVERY_+uwsdo.html
Targets
-
-
Target
317f0f29c592d238088f22ca8e1e794078c1a3f060700b8b94ced7919f66c214
-
Size
314KB
-
MD5
2e35cb5dee05f2e5fdcb98ad97a8d007
-
SHA1
3ea08ef7a0dc32173e6240a4ce4fb17f7cdb2005
-
SHA256
317f0f29c592d238088f22ca8e1e794078c1a3f060700b8b94ced7919f66c214
-
SHA512
cc284f0989aac6de90274fddcc64b9b00c2b31a83d75bd82ceae4ced17f8e45a415ba12e6d0e3268ee4834026d47e3df4f7b7b4adb5b2d34d2382407d5887bda
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Deletes itself
-
Adds Run key to start application
-