General
-
Target
43a1f6e61356e5eff4fba7e0d175d3c4a31d703d6e0d376c005386a2e979686f
-
Size
308KB
-
Sample
220707-17lyfsecbj
-
MD5
32671210c0a482ab57ee2e2f23d974b8
-
SHA1
4a60d7dbb82893156753079e12f0ada1f5631124
-
SHA256
43a1f6e61356e5eff4fba7e0d175d3c4a31d703d6e0d376c005386a2e979686f
-
SHA512
132066579a1a268b47f9380cd92816dd76be3ec9cdbea2acb912d9982543da364563a218545bb4a43514276d26731b34080ae13b3c6e60896b7bf1a464e39b1c
Static task
static1
Behavioral task
behavioral1
Sample
43a1f6e61356e5eff4fba7e0d175d3c4a31d703d6e0d376c005386a2e979686f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
43a1f6e61356e5eff4fba7e0d175d3c4a31d703d6e0d376c005386a2e979686f.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_ReCoVeRy_+rrkxa.txt
teslacrypt
http://t54ndnku456ngkwsudqer.wallymac.com/1FF3D2DF7B9877D
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/1FF3D2DF7B9877D
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/1FF3D2DF7B9877D
http://xlowfznrg4wf7dli.ONION/1FF3D2DF7B9877D
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_ReCoVeRy_+rrkxa.html
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_ReCoVeRy_+finco.txt
teslacrypt
http://t54ndnku456ngkwsudqer.wallymac.com/40D1774595D8F974
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/40D1774595D8F974
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/40D1774595D8F974
http://xlowfznrg4wf7dli.ONION/40D1774595D8F974
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_ReCoVeRy_+finco.html
Targets
-
-
Target
43a1f6e61356e5eff4fba7e0d175d3c4a31d703d6e0d376c005386a2e979686f
-
Size
308KB
-
MD5
32671210c0a482ab57ee2e2f23d974b8
-
SHA1
4a60d7dbb82893156753079e12f0ada1f5631124
-
SHA256
43a1f6e61356e5eff4fba7e0d175d3c4a31d703d6e0d376c005386a2e979686f
-
SHA512
132066579a1a268b47f9380cd92816dd76be3ec9cdbea2acb912d9982543da364563a218545bb4a43514276d26731b34080ae13b3c6e60896b7bf1a464e39b1c
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-