General
-
Target
43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0
-
Size
364KB
-
Sample
220707-z1ckrscbbn
-
MD5
833c63e2520b66e2d6931dc117463ca5
-
SHA1
e1cd37f586a25fe7681d8c5ec41500ddaa112fc3
-
SHA256
43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0
-
SHA512
9e374ad770a3983967fee753832ae16c86218122d18a5ed052983f64e468bc8fa2d5570396ce8948b411be429e4a932a7d1d47af42767bf1a0edba65edf9c9a6
Static task
static1
Behavioral task
behavioral1
Sample
43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+sunpu.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/82DC8A17F94E51C3
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/82DC8A17F94E51C3
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/82DC8A17F94E51C3
http://xlowfznrg4wf7dli.ONION/82DC8A17F94E51C3
Extracted
C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\_RECoVERY_+rwbyt.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/1B25C6198D7C1DE
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/1B25C6198D7C1DE
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/1B25C6198D7C1DE
http://xlowfznrg4wf7dli.ONION/1B25C6198D7C1DE
Targets
-
-
Target
43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0
-
Size
364KB
-
MD5
833c63e2520b66e2d6931dc117463ca5
-
SHA1
e1cd37f586a25fe7681d8c5ec41500ddaa112fc3
-
SHA256
43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0
-
SHA512
9e374ad770a3983967fee753832ae16c86218122d18a5ed052983f64e468bc8fa2d5570396ce8948b411be429e4a932a7d1d47af42767bf1a0edba65edf9c9a6
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-