General
-
Target
469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3
-
Size
366KB
-
Sample
220707-j3ng2sgcbk
-
MD5
6e8553bd03e63431388120b6a772e1ee
-
SHA1
ab5ffbed5e461e453431a3ab1ea7019e555dee5f
-
SHA256
469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3
-
SHA512
c3a6c27eb4d04f8afe42fb7f4f242e1c61a38f684556eda84925be75b94584aba0f7908a09050aeb03d308cdc238210054aef5bd3b37a9b30e29ce18ae037960
Static task
static1
Behavioral task
behavioral1
Sample
469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\_RECoVERY_+wvtsw.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/6FCB4ECA58D14FA
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/6FCB4ECA58D14FA
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/6FCB4ECA58D14FA
http://xlowfznrg4wf7dli.ONION/6FCB4ECA58D14FA
Extracted
C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\_RECoVERY_+oxbru.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/A3D1805FDE1532E
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/A3D1805FDE1532E
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/A3D1805FDE1532E
http://xlowfznrg4wf7dli.ONION/A3D1805FDE1532E
Targets
-
-
Target
469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3
-
Size
366KB
-
MD5
6e8553bd03e63431388120b6a772e1ee
-
SHA1
ab5ffbed5e461e453431a3ab1ea7019e555dee5f
-
SHA256
469f8d17cdcd46cd23ab807ba3305a888d0e2c801fa7c6499b0f719444d71bd3
-
SHA512
c3a6c27eb4d04f8afe42fb7f4f242e1c61a38f684556eda84925be75b94584aba0f7908a09050aeb03d308cdc238210054aef5bd3b37a9b30e29ce18ae037960
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-