General
-
Target
37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b
-
Size
344KB
-
Sample
220626-aencpsbea4
-
MD5
54a1ca99363f3f777841416acc597cd5
-
SHA1
1f24ad129b53307b679d797145ab0f17b19927b4
-
SHA256
37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b
-
SHA512
a37b1bd104e2173e119b37e2c8090b9723dd24457412fedcf1f653754ba666e32121cb8530d63662b7cadb5c8410cbd087acda9bebdbfaff00769f9052506155
Static task
static1
Behavioral task
behavioral1
Sample
37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\Recovery+hanxi.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/DD6EA5598E7ABB52
http://tes543berda73i48fsdfsd.keratadze.at/DD6EA5598E7ABB52
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/DD6EA5598E7ABB52
http://xlowfznrg4wf7dli.ONION/DD6EA5598E7ABB52
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\Recovery+etpft.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/A92EFD85BD3DBC5
http://tes543berda73i48fsdfsd.keratadze.at/A92EFD85BD3DBC5
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/A92EFD85BD3DBC5
http://xlowfznrg4wf7dli.ONION/A92EFD85BD3DBC5
Targets
-
-
Target
37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b
-
Size
344KB
-
MD5
54a1ca99363f3f777841416acc597cd5
-
SHA1
1f24ad129b53307b679d797145ab0f17b19927b4
-
SHA256
37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b
-
SHA512
a37b1bd104e2173e119b37e2c8090b9723dd24457412fedcf1f653754ba666e32121cb8530d63662b7cadb5c8410cbd087acda9bebdbfaff00769f9052506155
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-