General
-
Target
3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710
-
Size
328KB
-
Sample
220701-glvtpagdf7
-
MD5
2b1a58eeb647b9d221ea9bbe1e4fda35
-
SHA1
dddd52a8c7301b5fa2798295bf8e5856229f484b
-
SHA256
3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710
-
SHA512
48c663c46167b171e3d5602c0eed03ed8b5e2eda9ad08dc80aee76ecf6920e4358097c8a9fd9272a8a26243175e5305b8715990f5b425005a21574a1b3e535a8
Static task
static1
Behavioral task
behavioral1
Sample
3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\Recovery+agswu.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/D2A75F4BAFA5712
http://kkd47eh4hdjshb5t.angortra.at/D2A75F4BAFA5712
http://ytrest84y5i456hghadefdsd.pontogrot.com/D2A75F4BAFA5712
http://xlowfznrg4wf7dli.ONION/D2A75F4BAFA5712
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\Recovery+oxynd.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/1C3A65EF86D3056
http://kkd47eh4hdjshb5t.angortra.at/1C3A65EF86D3056
http://ytrest84y5i456hghadefdsd.pontogrot.com/1C3A65EF86D3056
http://xlowfznrg4wf7dli.ONION/1C3A65EF86D3056
Targets
-
-
Target
3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710
-
Size
328KB
-
MD5
2b1a58eeb647b9d221ea9bbe1e4fda35
-
SHA1
dddd52a8c7301b5fa2798295bf8e5856229f484b
-
SHA256
3eb005282668aeea30cbb9990cf27a796785829d887954fdc5e1f8497d781710
-
SHA512
48c663c46167b171e3d5602c0eed03ed8b5e2eda9ad08dc80aee76ecf6920e4358097c8a9fd9272a8a26243175e5305b8715990f5b425005a21574a1b3e535a8
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-