General
-
Target
2e651eb784a9813791ccbd6f601e1d6d0e5c073000cda24b1a1de1aa2a9eb456
-
Size
340KB
-
Sample
220622-kq693acagp
-
MD5
72c84a358ef3261bb71583cc82bfdd43
-
SHA1
f21588328a0662da2f3b2b7d46c1869df19cc7b0
-
SHA256
2e651eb784a9813791ccbd6f601e1d6d0e5c073000cda24b1a1de1aa2a9eb456
-
SHA512
0a919ef2e5e7d56b22baea125a4ebf7544a0678b90235fbca269fac05a98faa08ce17e712c7e487e1b46832eb37c7aca1af151d2647c1d61730cebc29ec8d325
Static task
static1
Behavioral task
behavioral1
Sample
2e651eb784a9813791ccbd6f601e1d6d0e5c073000cda24b1a1de1aa2a9eb456.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2e651eb784a9813791ccbd6f601e1d6d0e5c073000cda24b1a1de1aa2a9eb456.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\Recovery+hwfyl.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/BEFCDF5C45E75BB9
http://tes543berda73i48fsdfsd.keratadze.at/BEFCDF5C45E75BB9
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/BEFCDF5C45E75BB9
http://xlowfznrg4wf7dli.ONION/BEFCDF5C45E75BB9
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\Recovery+gmvqx.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/8B5776BE73808B4C
http://tes543berda73i48fsdfsd.keratadze.at/8B5776BE73808B4C
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/8B5776BE73808B4C
http://xlowfznrg4wf7dli.ONION/8B5776BE73808B4C
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\Recovery+gmvqx.html
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/8B5776BE73808B4C
http://tes543berda73i48fsdfsd.keratadze.at/8B5776BE73808B4C
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/8B5776BE73808B4C
http://xlowfznrg4wf7dli.onion/8B5776BE73808B4C
Targets
-
-
Target
2e651eb784a9813791ccbd6f601e1d6d0e5c073000cda24b1a1de1aa2a9eb456
-
Size
340KB
-
MD5
72c84a358ef3261bb71583cc82bfdd43
-
SHA1
f21588328a0662da2f3b2b7d46c1869df19cc7b0
-
SHA256
2e651eb784a9813791ccbd6f601e1d6d0e5c073000cda24b1a1de1aa2a9eb456
-
SHA512
0a919ef2e5e7d56b22baea125a4ebf7544a0678b90235fbca269fac05a98faa08ce17e712c7e487e1b46832eb37c7aca1af151d2647c1d61730cebc29ec8d325
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-