General
-
Target
36080b0db515ae4caadb466a472ab3989d4b69e8e8a134498411842fa690cafd
-
Size
276KB
-
Sample
220626-ehqpfsgbep
-
MD5
3873821d3962006e94a7f3a1b90fda81
-
SHA1
34b9b1921f32c0e84d73a8d1909529a737204a7c
-
SHA256
36080b0db515ae4caadb466a472ab3989d4b69e8e8a134498411842fa690cafd
-
SHA512
da3c1fa8bc095ec87c89ea7df29896ce333514f8fd6baa894bbc204ab65a999447aeceab26f4248e115715771fb565e89b457ab4a0382200a68f706e447bb1fd
Static task
static1
Behavioral task
behavioral1
Sample
36080b0db515ae4caadb466a472ab3989d4b69e8e8a134498411842fa690cafd.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
36080b0db515ae4caadb466a472ab3989d4b69e8e8a134498411842fa690cafd.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+cfwsm.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/B768464F0CD5241
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/B768464F0CD5241
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/B768464F0CD5241
http://xlowfznrg4wf7dli.ONION/B768464F0CD5241
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+cfwsm.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+vubxq.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/BBFD4F1E8DAAFA8A
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/BBFD4F1E8DAAFA8A
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/BBFD4F1E8DAAFA8A
http://xlowfznrg4wf7dli.ONION/BBFD4F1E8DAAFA8A
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+vubxq.html
Targets
-
-
Target
36080b0db515ae4caadb466a472ab3989d4b69e8e8a134498411842fa690cafd
-
Size
276KB
-
MD5
3873821d3962006e94a7f3a1b90fda81
-
SHA1
34b9b1921f32c0e84d73a8d1909529a737204a7c
-
SHA256
36080b0db515ae4caadb466a472ab3989d4b69e8e8a134498411842fa690cafd
-
SHA512
da3c1fa8bc095ec87c89ea7df29896ce333514f8fd6baa894bbc204ab65a999447aeceab26f4248e115715771fb565e89b457ab4a0382200a68f706e447bb1fd
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-