General
-
Target
47fbea4f13a50fa11e1ef0afc81a3df67ea7cd49c968943d96f92c5182211d6b
-
Size
216KB
-
Sample
220620-c9jdcaeeb5
-
MD5
3f24648631e68700d36527c245353aeb
-
SHA1
647c6c82584663139f8c1641a003533152f76705
-
SHA256
47fbea4f13a50fa11e1ef0afc81a3df67ea7cd49c968943d96f92c5182211d6b
-
SHA512
b4c7b57842aa778fd66c23f022da4a725bdd4aff14858edfd8d23b124a448e55a39e398d91183aaab9c576c4965458588db8edc8d7aa491eb1ecd61c2dccf349
Static task
static1
Behavioral task
behavioral1
Sample
mavphmkygcay.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
mavphmkygcay.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+yisph.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/D73B8A8E607B3522
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/D73B8A8E607B3522
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/D73B8A8E607B3522
http://xlowfznrg4wf7dli.ONION/D73B8A8E607B3522
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+yisph.html
Extracted
C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\_ReCoVeRy_+jsepj.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/7E7C3D137A1521BF
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/7E7C3D137A1521BF
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/7E7C3D137A1521BF
http://xlowfznrg4wf7dli.ONION/7E7C3D137A1521BF
Extracted
C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\_ReCoVeRy_+jsepj.html
Targets
-
-
Target
mavphmkygcay.exe
-
Size
312KB
-
MD5
cb5515d0d61ed8bb1604b7b61250d8ef
-
SHA1
e879872fef8ca8a99acdfc17dfe4f80fbad37759
-
SHA256
5d5d5ca94886962ef0703f8bafa57ce7e933617af64a86dc98cb0e5252728944
-
SHA512
bb000a4554c77e45de10445ae153b99afd011c57780bc3a59d2a9c1243fb0dcb64c567ca5c41d88c35ae3374dea5470e235e164b78a27fbb52166e7d6f4ffc57
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-