General
-
Target
418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a
-
Size
308KB
-
Sample
220708-f6gl5abcel
-
MD5
2854f3ee319e80dd485446f4acae042e
-
SHA1
01086bd863fdf7c8eb1e732bacdd914f09d355e2
-
SHA256
418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a
-
SHA512
4991feb491391cf44ae61128084f9c725c30df4640783293c72cd9801a216ef026ded9fda50e23c222bd3cbe74aeed9d785b5e58ff66410b85fd5b799c483aa4
Static task
static1
Behavioral task
behavioral1
Sample
418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\_ReCoVeRy_+dufbw.txt
teslacrypt
http://t54ndnku456ngkwsudqer.wallymac.com/F638B31443F92BE2
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/F638B31443F92BE2
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/F638B31443F92BE2
http://xlowfznrg4wf7dli.ONION/F638B31443F92BE2
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\_ReCoVeRy_+dufbw.html
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_ReCoVeRy_+tsmpu.txt
teslacrypt
http://t54ndnku456ngkwsudqer.wallymac.com/49E71824CFF979B1
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/49E71824CFF979B1
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/49E71824CFF979B1
http://xlowfznrg4wf7dli.ONION/49E71824CFF979B1
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_ReCoVeRy_+tsmpu.html
Targets
-
-
Target
418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a
-
Size
308KB
-
MD5
2854f3ee319e80dd485446f4acae042e
-
SHA1
01086bd863fdf7c8eb1e732bacdd914f09d355e2
-
SHA256
418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a
-
SHA512
4991feb491391cf44ae61128084f9c725c30df4640783293c72cd9801a216ef026ded9fda50e23c222bd3cbe74aeed9d785b5e58ff66410b85fd5b799c483aa4
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-