General
-
Target
3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513
-
Size
308KB
-
Sample
220625-zljersbeeq
-
MD5
7800dce6bbde60e92c43f767c137286b
-
SHA1
129d1703e459dde4b3e89f46f01b9bb826f962ec
-
SHA256
3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513
-
SHA512
90b8cdc2b26cd9eba82db1eeedad2b4ed76ec17c1f579ca54ad4cf65557d9ae6070e78162629c4c07ad163085cd0af7d032d5431176ffddb703aeb105102354f
Static task
static1
Behavioral task
behavioral1
Sample
3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+xausw.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/59E1C6454D865CB1
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/59E1C6454D865CB1
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/59E1C6454D865CB1
http://xlowfznrg4wf7dli.ONION/59E1C6454D865CB1
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+xausw.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+xftee.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/9AA5F9446494182
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/9AA5F9446494182
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/9AA5F9446494182
http://xlowfznrg4wf7dli.ONION/9AA5F9446494182
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+xftee.html
Targets
-
-
Target
3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513
-
Size
308KB
-
MD5
7800dce6bbde60e92c43f767c137286b
-
SHA1
129d1703e459dde4b3e89f46f01b9bb826f962ec
-
SHA256
3835517f385a159da1694283594863b94980da7f767f8e3bf2653b3f076a0513
-
SHA512
90b8cdc2b26cd9eba82db1eeedad2b4ed76ec17c1f579ca54ad4cf65557d9ae6070e78162629c4c07ad163085cd0af7d032d5431176ffddb703aeb105102354f
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-