General
-
Target
44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d
-
Size
396KB
-
Sample
220707-wzmgsseffq
-
MD5
794f78c8b950dc1a840d165892cb0596
-
SHA1
4667584f756b8e67a504ada9141f868e59f8dbb1
-
SHA256
44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d
-
SHA512
1151775fe618496334f1bf184e4f65bfb83125918ffa80274e7e560c49a10a838cf253e7b7404df37e8219a827d47117900b7a26c5f97041227d931138d708d0
Static task
static1
Behavioral task
behavioral1
Sample
44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_RECoVERY_+ieepd.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/5543BBC86777C8A4
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/5543BBC86777C8A4
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/5543BBC86777C8A4
http://xlowfznrg4wf7dli.ONION/5543BBC86777C8A4
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_RECoVERY_+ieepd.html
Extracted
C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\_RECoVERY_+brwih.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/4C9D79DF556F837F
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/4C9D79DF556F837F
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/4C9D79DF556F837F
http://xlowfznrg4wf7dli.ONION/4C9D79DF556F837F
Extracted
C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\_RECoVERY_+brwih.html
Targets
-
-
Target
44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d
-
Size
396KB
-
MD5
794f78c8b950dc1a840d165892cb0596
-
SHA1
4667584f756b8e67a504ada9141f868e59f8dbb1
-
SHA256
44bb8e023b4c0e0b5830a58d120ac427cbdcb4897dc74e91c155ea169b07d99d
-
SHA512
1151775fe618496334f1bf184e4f65bfb83125918ffa80274e7e560c49a10a838cf253e7b7404df37e8219a827d47117900b7a26c5f97041227d931138d708d0
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-