General
-
Target
4330bfda9eec337dd8acf0d859bf583a4d97af6a3ec091a7e7110d902dd73c06
-
Size
421KB
-
Sample
220707-3pjfqaghcp
-
MD5
7aee5b9eda40e9acc892db4c3b7c4fb7
-
SHA1
ab4d13b7433856c602eba8f95b3ebbfa32baaa1f
-
SHA256
4330bfda9eec337dd8acf0d859bf583a4d97af6a3ec091a7e7110d902dd73c06
-
SHA512
bfc3a803fd116ec1dddc159084b12534b16617e5e086d9a9f6bf0e0b4b1b574f1daadf64abb341eabbfd5e0a9cc2f1a0d1feef9d6e6cf1ea928f6fe25795483d
Static task
static1
Behavioral task
behavioral1
Sample
4330bfda9eec337dd8acf0d859bf583a4d97af6a3ec091a7e7110d902dd73c06.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4330bfda9eec337dd8acf0d859bf583a4d97af6a3ec091a7e7110d902dd73c06.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_RECoVERY_+teejr.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/7C3B4BEC7E2AB03B
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/7C3B4BEC7E2AB03B
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/7C3B4BEC7E2AB03B
http://xlowfznrg4wf7dli.ONION/7C3B4BEC7E2AB03B
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_RECoVERY_+teejr.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1081944012-3634099177-1681222835-1000\_RECoVERY_+snqfg.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/A0557EFA9A73C61
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/A0557EFA9A73C61
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/A0557EFA9A73C61
http://xlowfznrg4wf7dli.ONION/A0557EFA9A73C61
Extracted
C:\$Recycle.Bin\S-1-5-21-1081944012-3634099177-1681222835-1000\_RECoVERY_+snqfg.html
Targets
-
-
Target
4330bfda9eec337dd8acf0d859bf583a4d97af6a3ec091a7e7110d902dd73c06
-
Size
421KB
-
MD5
7aee5b9eda40e9acc892db4c3b7c4fb7
-
SHA1
ab4d13b7433856c602eba8f95b3ebbfa32baaa1f
-
SHA256
4330bfda9eec337dd8acf0d859bf583a4d97af6a3ec091a7e7110d902dd73c06
-
SHA512
bfc3a803fd116ec1dddc159084b12534b16617e5e086d9a9f6bf0e0b4b1b574f1daadf64abb341eabbfd5e0a9cc2f1a0d1feef9d6e6cf1ea928f6fe25795483d
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-