General
-
Target
35d1fa7feffeb02de85e5726deb2c229d45ef193a1684afd97faeb01f1166e0e
-
Size
240KB
-
Sample
220627-bevbpaadc9
-
MD5
180332aa8761749cb03a06e000e614f2
-
SHA1
4be7216002a0b13c2c7772728e1c0047f5d39f85
-
SHA256
35d1fa7feffeb02de85e5726deb2c229d45ef193a1684afd97faeb01f1166e0e
-
SHA512
838b214cca0aa92987e01cb83aeabe5f5d404dc9d90332fee869c42883abe27a59f4e06c4939502f51ae8ac358f24f2ec866317fb52baea0e415b3ed383c61be
Static task
static1
Behavioral task
behavioral1
Sample
35d1fa7feffeb02de85e5726deb2c229d45ef193a1684afd97faeb01f1166e0e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
35d1fa7feffeb02de85e5726deb2c229d45ef193a1684afd97faeb01f1166e0e.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\Recovery+lauxs.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/6AB1FE131BCA31
http://tes543berda73i48fsdfsd.keratadze.at/6AB1FE131BCA31
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/6AB1FE131BCA31
http://xlowfznrg4wf7dli.ONION/6AB1FE131BCA31
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\Recovery+lauxs.html
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/6AB1FE131BCA31
http://tes543berda73i48fsdfsd.keratadze.at/6AB1FE131BCA31
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/6AB1FE131BCA31
http://xlowfznrg4wf7dli.onion/6AB1FE131BCA31
Targets
-
-
Target
35d1fa7feffeb02de85e5726deb2c229d45ef193a1684afd97faeb01f1166e0e
-
Size
240KB
-
MD5
180332aa8761749cb03a06e000e614f2
-
SHA1
4be7216002a0b13c2c7772728e1c0047f5d39f85
-
SHA256
35d1fa7feffeb02de85e5726deb2c229d45ef193a1684afd97faeb01f1166e0e
-
SHA512
838b214cca0aa92987e01cb83aeabe5f5d404dc9d90332fee869c42883abe27a59f4e06c4939502f51ae8ac358f24f2ec866317fb52baea0e415b3ed383c61be
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Registers COM server for autorun
-
Sets file execution options in registry
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-