General
-
Target
336f5d48aa6866a97428db9cd4040307da1ca37ee9497fb4c3c8ed8bfe5b9b5e
-
Size
364KB
-
Sample
220620-cv7gmabeam
-
MD5
0c3ec2005521e6516fe518b9931f69f7
-
SHA1
68455b79f62a0508047bf42f6fdbdc7bdbc49e69
-
SHA256
336f5d48aa6866a97428db9cd4040307da1ca37ee9497fb4c3c8ed8bfe5b9b5e
-
SHA512
8834486c76f6a6d5ded24afc0e15ed50e47552e2ea86917ce6eba4db1ba48a27a8c9e6487af333ee7588e3f2cd88404bc8131355761ec3d160c30e248681433b
Static task
static1
Behavioral task
behavioral1
Sample
336f5d48aa6866a97428db9cd4040307da1ca37ee9497fb4c3c8ed8bfe5b9b5e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
336f5d48aa6866a97428db9cd4040307da1ca37ee9497fb4c3c8ed8bfe5b9b5e.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+mroio.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/11A333D628D7B941
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/11A333D628D7B941
http://yyre45dbvn2nhbefbmh.begumvelic.at/11A333D628D7B941
http://xlowfznrg4wf7dli.ONION/11A333D628D7B941
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+mroio.html
Extracted
C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\_ReCoVeRy_+igyyx.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/278BF04FDCF31A77
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/278BF04FDCF31A77
http://yyre45dbvn2nhbefbmh.begumvelic.at/278BF04FDCF31A77
http://xlowfznrg4wf7dli.ONION/278BF04FDCF31A77
Extracted
C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\_ReCoVeRy_+igyyx.html
Targets
-
-
Target
336f5d48aa6866a97428db9cd4040307da1ca37ee9497fb4c3c8ed8bfe5b9b5e
-
Size
364KB
-
MD5
0c3ec2005521e6516fe518b9931f69f7
-
SHA1
68455b79f62a0508047bf42f6fdbdc7bdbc49e69
-
SHA256
336f5d48aa6866a97428db9cd4040307da1ca37ee9497fb4c3c8ed8bfe5b9b5e
-
SHA512
8834486c76f6a6d5ded24afc0e15ed50e47552e2ea86917ce6eba4db1ba48a27a8c9e6487af333ee7588e3f2cd88404bc8131355761ec3d160c30e248681433b
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-