General
-
Target
3c82be68f43f6c0a0dc4712002903240263bc82087c17c867911a232789c99d5
-
Size
508KB
-
Sample
220703-h2eyvacah3
-
MD5
4e757c9f5b74820e93512cc4fcf9c3c0
-
SHA1
a828e263a7e8a5154bb90614b49a4089695f7609
-
SHA256
3c82be68f43f6c0a0dc4712002903240263bc82087c17c867911a232789c99d5
-
SHA512
19c92c4d77be6ae1e5d028583a59ed344bf24a5db2a2d5d5b9d970f3e1c14a96eaf3c2f7097a6e1086ff177afc22561bad5fe807abee6bea5088e42d9fd978d0
Static task
static1
Behavioral task
behavioral1
Sample
3c82be68f43f6c0a0dc4712002903240263bc82087c17c867911a232789c99d5.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3c82be68f43f6c0a0dc4712002903240263bc82087c17c867911a232789c99d5.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+crwpk.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/2A876FD67DD0BAEA
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/2A876FD67DD0BAEA
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/2A876FD67DD0BAEA
http://xlowfznrg4wf7dli.ONION/2A876FD67DD0BAEA
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+crwpk.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1081944012-3634099177-1681222835-1000\_ReCoVeRy_+kisdd.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/77C6B0A49147ACB8
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/77C6B0A49147ACB8
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/77C6B0A49147ACB8
http://xlowfznrg4wf7dli.ONION/77C6B0A49147ACB8
Extracted
C:\$Recycle.Bin\S-1-5-21-1081944012-3634099177-1681222835-1000\_ReCoVeRy_+kisdd.html
Targets
-
-
Target
3c82be68f43f6c0a0dc4712002903240263bc82087c17c867911a232789c99d5
-
Size
508KB
-
MD5
4e757c9f5b74820e93512cc4fcf9c3c0
-
SHA1
a828e263a7e8a5154bb90614b49a4089695f7609
-
SHA256
3c82be68f43f6c0a0dc4712002903240263bc82087c17c867911a232789c99d5
-
SHA512
19c92c4d77be6ae1e5d028583a59ed344bf24a5db2a2d5d5b9d970f3e1c14a96eaf3c2f7097a6e1086ff177afc22561bad5fe807abee6bea5088e42d9fd978d0
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-