General
-
Target
3c6617a14ce2c81ee1148f9fc23b6e365c7028bdc72f477cbaec2ae97536a544
-
Size
211KB
-
Sample
220703-jfelmaafcl
-
MD5
391d5c1032d21993431cd763cf1f0275
-
SHA1
42346f6255aba3a01ffeeaaf5701730a7346a351
-
SHA256
3c6617a14ce2c81ee1148f9fc23b6e365c7028bdc72f477cbaec2ae97536a544
-
SHA512
b2c9ac996ef2e6191dc63b31677934cb4b77120196c9b29514df2c28b326bc725e22369896b3f915d4bfca88b066effc73c898e0fe9c8385655efcbb98363030
Static task
static1
Behavioral task
behavioral1
Sample
3c6617a14ce2c81ee1148f9fc23b6e365c7028bdc72f477cbaec2ae97536a544.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3c6617a14ce2c81ee1148f9fc23b6e365c7028bdc72f477cbaec2ae97536a544.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+yjmnp.txt
http://974gfbjhb23hbfkyfaby3byqlyuebvly5q254y.mendilobo.com/87A88698E6734CB
http://a64gfdsjhb4htbiwaysbdvukyft5q.zobodine.at/87A88698E6734CB
http://rbg4hfbilrf7to452p89hrfq.boonmower.com/87A88698E6734CB
http://xlowfznrg4wf7dli.onion/87A88698E6734CB
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+yjmnp.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+oivwe.txt
http://974gfbjhb23hbfkyfaby3byqlyuebvly5q254y.mendilobo.com/3B2DEC74196AB99
http://a64gfdsjhb4htbiwaysbdvukyft5q.zobodine.at/3B2DEC74196AB99
http://rbg4hfbilrf7to452p89hrfq.boonmower.com/3B2DEC74196AB99
http://xlowfznrg4wf7dli.onion/3B2DEC74196AB99
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+oivwe.html
Targets
-
-
Target
3c6617a14ce2c81ee1148f9fc23b6e365c7028bdc72f477cbaec2ae97536a544
-
Size
211KB
-
MD5
391d5c1032d21993431cd763cf1f0275
-
SHA1
42346f6255aba3a01ffeeaaf5701730a7346a351
-
SHA256
3c6617a14ce2c81ee1148f9fc23b6e365c7028bdc72f477cbaec2ae97536a544
-
SHA512
b2c9ac996ef2e6191dc63b31677934cb4b77120196c9b29514df2c28b326bc725e22369896b3f915d4bfca88b066effc73c898e0fe9c8385655efcbb98363030
Score10/10-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-