General
-
Target
35dca4e9558e6f603aaad3c31b87b4f629fb64ac0ceb04ad40cda36e327f005d
-
Size
336KB
-
Sample
220626-2r9v1sfea7
-
MD5
7ba5c258ad55f9c3ad3b568041526093
-
SHA1
5991df05d2d62fb089e9e02d7e9f89cfeef3efc0
-
SHA256
35dca4e9558e6f603aaad3c31b87b4f629fb64ac0ceb04ad40cda36e327f005d
-
SHA512
c3d2e5d9ddd315863842aeefe7f7f8c87b70569ec3ecc0012f66cab78f241fcc27836b28bb7ef643e01cf2bb3e17c9f9648ca7b606f09a6b60faa6d98fc43f08
Static task
static1
Behavioral task
behavioral1
Sample
35dca4e9558e6f603aaad3c31b87b4f629fb64ac0ceb04ad40cda36e327f005d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
35dca4e9558e6f603aaad3c31b87b4f629fb64ac0ceb04ad40cda36e327f005d.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+urmna.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/A8465C86849D338
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/A8465C86849D338
http://yyre45dbvn2nhbefbmh.begumvelic.at/A8465C86849D338
http://xlowfznrg4wf7dli.ONION/A8465C86849D338
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+urmna.html
Targets
-
-
Target
35dca4e9558e6f603aaad3c31b87b4f629fb64ac0ceb04ad40cda36e327f005d
-
Size
336KB
-
MD5
7ba5c258ad55f9c3ad3b568041526093
-
SHA1
5991df05d2d62fb089e9e02d7e9f89cfeef3efc0
-
SHA256
35dca4e9558e6f603aaad3c31b87b4f629fb64ac0ceb04ad40cda36e327f005d
-
SHA512
c3d2e5d9ddd315863842aeefe7f7f8c87b70569ec3ecc0012f66cab78f241fcc27836b28bb7ef643e01cf2bb3e17c9f9648ca7b606f09a6b60faa6d98fc43f08
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-