General
-
Target
43fb7bf938736abced7de012b8395088752387ddccce4521af977410c3b4a1b9
-
Size
424KB
-
Sample
220707-z1pv4acbcp
-
MD5
197ef937b8c32bec4f8a0db5b1e8df7f
-
SHA1
735102b45ca1e87ed6fbc045cc41483e795dbf21
-
SHA256
43fb7bf938736abced7de012b8395088752387ddccce4521af977410c3b4a1b9
-
SHA512
0c24f36e6d466c19d4b20ebee30259a2e7d1cb3cd957708ab46b993433f510cc97d42bd192f6a9ceb0c517c88c56397189af3088083534a357ac017b4a4a1403
Static task
static1
Behavioral task
behavioral1
Sample
43fb7bf938736abced7de012b8395088752387ddccce4521af977410c3b4a1b9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
43fb7bf938736abced7de012b8395088752387ddccce4521af977410c3b4a1b9.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+apagi.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/701751618A95D6A
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/701751618A95D6A
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/701751618A95D6A
http://xlowfznrg4wf7dli.ONION/701751618A95D6A
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_RECoVERY_+tjelg.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/545E80C5DEB6755
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/545E80C5DEB6755
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/545E80C5DEB6755
http://xlowfznrg4wf7dli.ONION/545E80C5DEB6755
Targets
-
-
Target
43fb7bf938736abced7de012b8395088752387ddccce4521af977410c3b4a1b9
-
Size
424KB
-
MD5
197ef937b8c32bec4f8a0db5b1e8df7f
-
SHA1
735102b45ca1e87ed6fbc045cc41483e795dbf21
-
SHA256
43fb7bf938736abced7de012b8395088752387ddccce4521af977410c3b4a1b9
-
SHA512
0c24f36e6d466c19d4b20ebee30259a2e7d1cb3cd957708ab46b993433f510cc97d42bd192f6a9ceb0c517c88c56397189af3088083534a357ac017b4a4a1403
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-