General
-
Target
395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f
-
Size
312KB
-
Sample
220625-njkn9sceb7
-
MD5
93fccd57d1718dcc740cba5c9df7bdc2
-
SHA1
b3ce3fb78963e0196938be515c0dd294d1719ee9
-
SHA256
395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f
-
SHA512
6f36a3bbe3abdaedf58657d8b0e2e14ac96c418cb45499623283e88b265e30fddf349ee79c6c068f762b7d7156fc24e884a6f6fb1bc8eed9ed47761e428ddc7f
Static task
static1
Behavioral task
behavioral1
Sample
395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_ReCoVeRy_+uomjx.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/38FF9BF5836A29B9
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/38FF9BF5836A29B9
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/38FF9BF5836A29B9
http://xlowfznrg4wf7dli.ONION/38FF9BF5836A29B9
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_ReCoVeRy_+uomjx.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+wsoef.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/44145BAC15ABF0
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/44145BAC15ABF0
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/44145BAC15ABF0
http://xlowfznrg4wf7dli.ONION/44145BAC15ABF0
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+wsoef.html
Targets
-
-
Target
395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f
-
Size
312KB
-
MD5
93fccd57d1718dcc740cba5c9df7bdc2
-
SHA1
b3ce3fb78963e0196938be515c0dd294d1719ee9
-
SHA256
395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f
-
SHA512
6f36a3bbe3abdaedf58657d8b0e2e14ac96c418cb45499623283e88b265e30fddf349ee79c6c068f762b7d7156fc24e884a6f6fb1bc8eed9ed47761e428ddc7f
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-