General
-
Target
3619101e101b7197d37b6b2c02687b81884f8c4ba021c25853f948b484fac4a4
-
Size
424KB
-
Sample
220626-d9ynpshfh6
-
MD5
591c7f90216f596b849ef9562b8f155b
-
SHA1
f3c185a27c38214418daa50407c9964fd5281d95
-
SHA256
3619101e101b7197d37b6b2c02687b81884f8c4ba021c25853f948b484fac4a4
-
SHA512
31cfa0fb8cc85398223b2377a170fbbdf01ad82764611c3c7775c80119bf0b5bd24d1943135ab18a3e1cff123813b0f786d522ea7d5c5387a1f84f8de6fa178f
Static task
static1
Behavioral task
behavioral1
Sample
3619101e101b7197d37b6b2c02687b81884f8c4ba021c25853f948b484fac4a4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3619101e101b7197d37b6b2c02687b81884f8c4ba021c25853f948b484fac4a4.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+lyjcr.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/C0C921457C34B8B9
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/C0C921457C34B8B9
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/C0C921457C34B8B9
http://xlowfznrg4wf7dli.ONION/C0C921457C34B8B9
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+lyjcr.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_RECoVERY_+mjofi.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/AB5C99490F31F
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/AB5C99490F31F
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/AB5C99490F31F
http://xlowfznrg4wf7dli.ONION/AB5C99490F31F
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_RECoVERY_+mjofi.html
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\_RECoVERY_+mjofi.html
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/AB5C99490F31F
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/AB5C99490F31F
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/AB5C99490F31F
http://xlowfznrg4wf7dli.onion/AB5C99490F31F
Targets
-
-
Target
3619101e101b7197d37b6b2c02687b81884f8c4ba021c25853f948b484fac4a4
-
Size
424KB
-
MD5
591c7f90216f596b849ef9562b8f155b
-
SHA1
f3c185a27c38214418daa50407c9964fd5281d95
-
SHA256
3619101e101b7197d37b6b2c02687b81884f8c4ba021c25853f948b484fac4a4
-
SHA512
31cfa0fb8cc85398223b2377a170fbbdf01ad82764611c3c7775c80119bf0b5bd24d1943135ab18a3e1cff123813b0f786d522ea7d5c5387a1f84f8de6fa178f
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-