General
-
Target
42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf
-
Size
352KB
-
Sample
220708-b5jymsecb5
-
MD5
0d704d7223e378e9e5c18d0f53e038da
-
SHA1
3f6bc9426c8e3eff59b8aad08cdb050ec2d3e7cb
-
SHA256
42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf
-
SHA512
f8dabf5ef228f143a699a31e366aa6af3fc13ada4a39448b3982e34c30e2afaeccf3b91c5b2d267ab895b8ffbe7da0daab13f8e49474dd68e47b923c9fd2eb85
Static task
static1
Behavioral task
behavioral1
Sample
42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+dacvq.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/779ED861476D90
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/779ED861476D90
http://yyre45dbvn2nhbefbmh.begumvelic.at/779ED861476D90
http://xlowfznrg4wf7dli.ONION/779ED861476D90
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+dacvq.html
Targets
-
-
Target
42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf
-
Size
352KB
-
MD5
0d704d7223e378e9e5c18d0f53e038da
-
SHA1
3f6bc9426c8e3eff59b8aad08cdb050ec2d3e7cb
-
SHA256
42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf
-
SHA512
f8dabf5ef228f143a699a31e366aa6af3fc13ada4a39448b3982e34c30e2afaeccf3b91c5b2d267ab895b8ffbe7da0daab13f8e49474dd68e47b923c9fd2eb85
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-