General
-
Target
3609680b4572e23659c4c308e38797c23e4b8c613b2831994ca7d58af4782535
-
Size
308KB
-
Sample
220626-egynnsgbcm
-
MD5
3ed7770fdab0c95abb32eaedb3ffd204
-
SHA1
1296c46350c5c124b095ac24c4be804ae6d93572
-
SHA256
3609680b4572e23659c4c308e38797c23e4b8c613b2831994ca7d58af4782535
-
SHA512
23b04d2c7f83177360c007d7ab18adc0022b4ed3db5f3fe56c4f50d5ac715b35c3dc0b26a6c3cf1d2deb2431fe7e706b180331887cc0580b6929a6d2874ad342
Static task
static1
Behavioral task
behavioral1
Sample
3609680b4572e23659c4c308e38797c23e4b8c613b2831994ca7d58af4782535.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3609680b4572e23659c4c308e38797c23e4b8c613b2831994ca7d58af4782535.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_ReCoVeRy_+farvy.txt
teslacrypt
http://t54ndnku456ngkwsudqer.wallymac.com/85ABBDD28C7F3468
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/85ABBDD28C7F3468
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/85ABBDD28C7F3468
http://xlowfznrg4wf7dli.ONION/85ABBDD28C7F3468
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_ReCoVeRy_+farvy.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1081944012-3634099177-1681222835-1000\_ReCoVeRy_+lgunh.txt
teslacrypt
http://t54ndnku456ngkwsudqer.wallymac.com/1EC463D96537326A
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/1EC463D96537326A
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/1EC463D96537326A
http://xlowfznrg4wf7dli.ONION/1EC463D96537326A
Extracted
C:\$Recycle.Bin\S-1-5-21-1081944012-3634099177-1681222835-1000\_ReCoVeRy_+lgunh.html
Targets
-
-
Target
3609680b4572e23659c4c308e38797c23e4b8c613b2831994ca7d58af4782535
-
Size
308KB
-
MD5
3ed7770fdab0c95abb32eaedb3ffd204
-
SHA1
1296c46350c5c124b095ac24c4be804ae6d93572
-
SHA256
3609680b4572e23659c4c308e38797c23e4b8c613b2831994ca7d58af4782535
-
SHA512
23b04d2c7f83177360c007d7ab18adc0022b4ed3db5f3fe56c4f50d5ac715b35c3dc0b26a6c3cf1d2deb2431fe7e706b180331887cc0580b6929a6d2874ad342
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-