General
-
Target
37278a7597be02859077f0c333b8bdc0886f421e91dd6df23db631259f8ca43d
-
Size
308KB
-
Sample
220626-akmncsbfh9
-
MD5
7c009828636a3dc2c89e3dd47dc83164
-
SHA1
dc2e2ab4c0894e1d78e35c24a8e072ee62708538
-
SHA256
37278a7597be02859077f0c333b8bdc0886f421e91dd6df23db631259f8ca43d
-
SHA512
739c905393888462ede7d0f424a11ddadc4e6b98592e48dcc9f324b767b2a9e04c9859b9a627b68973176e415b13ba988abb1a61f00337c1bb56f5075237d7e1
Static task
static1
Behavioral task
behavioral1
Sample
37278a7597be02859077f0c333b8bdc0886f421e91dd6df23db631259f8ca43d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
37278a7597be02859077f0c333b8bdc0886f421e91dd6df23db631259f8ca43d.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+aekqd.txt
teslacrypt
http://t54ndnku456ngkwsudqer.wallymac.com/3B83C5AD4763867
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/3B83C5AD4763867
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/3B83C5AD4763867
http://xlowfznrg4wf7dli.ONION/3B83C5AD4763867
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+aekqd.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+rblss.txt
teslacrypt
http://t54ndnku456ngkwsudqer.wallymac.com/316E3CE556B23B
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/316E3CE556B23B
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/316E3CE556B23B
http://xlowfznrg4wf7dli.ONION/316E3CE556B23B
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+rblss.html
Targets
-
-
Target
37278a7597be02859077f0c333b8bdc0886f421e91dd6df23db631259f8ca43d
-
Size
308KB
-
MD5
7c009828636a3dc2c89e3dd47dc83164
-
SHA1
dc2e2ab4c0894e1d78e35c24a8e072ee62708538
-
SHA256
37278a7597be02859077f0c333b8bdc0886f421e91dd6df23db631259f8ca43d
-
SHA512
739c905393888462ede7d0f424a11ddadc4e6b98592e48dcc9f324b767b2a9e04c9859b9a627b68973176e415b13ba988abb1a61f00337c1bb56f5075237d7e1
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-