General
-
Target
43929fd3dc0b319b76e1665f9efd56bafa7aad71f60382a2eb7c9cb4f0f48a33
-
Size
370KB
-
Sample
220707-2dxnjagec4
-
MD5
4adab6136c5fe9858c17284cbc253897
-
SHA1
f343ab2788e410624878a9eaf4a0fc6ae4c814c7
-
SHA256
43929fd3dc0b319b76e1665f9efd56bafa7aad71f60382a2eb7c9cb4f0f48a33
-
SHA512
c67fc5a8e0d2f958f87c7956e49e689f45cc6814fb98675accf3ceb145abccc8e185ff0bd91e83eda0be5b330409782ab07727a197de32acbc7594d38efad650
Static task
static1
Behavioral task
behavioral1
Sample
43929fd3dc0b319b76e1665f9efd56bafa7aad71f60382a2eb7c9cb4f0f48a33.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
43929fd3dc0b319b76e1665f9efd56bafa7aad71f60382a2eb7c9cb4f0f48a33.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\_RECoVERY_+rhomh.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/59C5873E92D5D779
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/59C5873E92D5D779
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/59C5873E92D5D779
http://xlowfznrg4wf7dli.ONION/59C5873E92D5D779
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_RECoVERY_+uefei.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/25C6C07C1B8A5BEB
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/25C6C07C1B8A5BEB
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/25C6C07C1B8A5BEB
http://xlowfznrg4wf7dli.ONION/25C6C07C1B8A5BEB
Targets
-
-
Target
43929fd3dc0b319b76e1665f9efd56bafa7aad71f60382a2eb7c9cb4f0f48a33
-
Size
370KB
-
MD5
4adab6136c5fe9858c17284cbc253897
-
SHA1
f343ab2788e410624878a9eaf4a0fc6ae4c814c7
-
SHA256
43929fd3dc0b319b76e1665f9efd56bafa7aad71f60382a2eb7c9cb4f0f48a33
-
SHA512
c67fc5a8e0d2f958f87c7956e49e689f45cc6814fb98675accf3ceb145abccc8e185ff0bd91e83eda0be5b330409782ab07727a197de32acbc7594d38efad650
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-