General
-
Target
3b0e0da9b176f2f434a2af57b81cf862633f66b23e0bd8f2dc819766875fbc96
-
Size
364KB
-
Sample
220703-wk4grsbbfn
-
MD5
2a975dfbd2e9080494da71b6fe3891ea
-
SHA1
f60256e6b6b231a3a72b5205db691e6330b0c6ba
-
SHA256
3b0e0da9b176f2f434a2af57b81cf862633f66b23e0bd8f2dc819766875fbc96
-
SHA512
ce19c64dca1775e8d6394907aa8aace33c2aff805ce0cd20889cae66bfdb1b37e576cb84dc3c5b75f3e87511ddb7ec3ee964a5f6709c45b99791d3ba870e83b6
Static task
static1
Behavioral task
behavioral1
Sample
3b0e0da9b176f2f434a2af57b81cf862633f66b23e0bd8f2dc819766875fbc96.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3b0e0da9b176f2f434a2af57b81cf862633f66b23e0bd8f2dc819766875fbc96.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+rojql.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/848083CB903DB5
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/848083CB903DB5
http://yyre45dbvn2nhbefbmh.begumvelic.at/848083CB903DB5
http://xlowfznrg4wf7dli.ONION/848083CB903DB5
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+rojql.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+sdfyt.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/E79C420D6B03D6B
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/E79C420D6B03D6B
http://yyre45dbvn2nhbefbmh.begumvelic.at/E79C420D6B03D6B
http://xlowfznrg4wf7dli.ONION/E79C420D6B03D6B
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+sdfyt.html
Targets
-
-
Target
3b0e0da9b176f2f434a2af57b81cf862633f66b23e0bd8f2dc819766875fbc96
-
Size
364KB
-
MD5
2a975dfbd2e9080494da71b6fe3891ea
-
SHA1
f60256e6b6b231a3a72b5205db691e6330b0c6ba
-
SHA256
3b0e0da9b176f2f434a2af57b81cf862633f66b23e0bd8f2dc819766875fbc96
-
SHA512
ce19c64dca1775e8d6394907aa8aace33c2aff805ce0cd20889cae66bfdb1b37e576cb84dc3c5b75f3e87511ddb7ec3ee964a5f6709c45b99791d3ba870e83b6
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-