General
-
Target
4d34b2338a457e83730c6eeb42e4478823ec39454bc80fdfa3dc8c55c83e7c0a
-
Size
392KB
-
Sample
220712-d9xreacbb3
-
MD5
838e6abe4e91ea7ac52db7be7e0eaa12
-
SHA1
313c1c224bd9c35b96a38d3429d87f9b133ff7eb
-
SHA256
4d34b2338a457e83730c6eeb42e4478823ec39454bc80fdfa3dc8c55c83e7c0a
-
SHA512
4ac841062e68e9b7d1b102fedbb92f64d31a486227b5f438a287939612c985d36283f30d9809cec5da044509b26cd672b2b597daeed2a2f3afe4c28f6c96b070
Static task
static1
Behavioral task
behavioral1
Sample
4d34b2338a457e83730c6eeb42e4478823ec39454bc80fdfa3dc8c55c83e7c0a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4d34b2338a457e83730c6eeb42e4478823ec39454bc80fdfa3dc8c55c83e7c0a.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\Recovery+txxwu.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/2B13CDDFE48AD771
http://tes543berda73i48fsdfsd.keratadze.at/2B13CDDFE48AD771
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/2B13CDDFE48AD771
http://xlowfznrg4wf7dli.ONION/2B13CDDFE48AD771
Extracted
C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\Recovery+chyey.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/A09D44CBD5E39E87
http://tes543berda73i48fsdfsd.keratadze.at/A09D44CBD5E39E87
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/A09D44CBD5E39E87
http://xlowfznrg4wf7dli.ONION/A09D44CBD5E39E87
Targets
-
-
Target
4d34b2338a457e83730c6eeb42e4478823ec39454bc80fdfa3dc8c55c83e7c0a
-
Size
392KB
-
MD5
838e6abe4e91ea7ac52db7be7e0eaa12
-
SHA1
313c1c224bd9c35b96a38d3429d87f9b133ff7eb
-
SHA256
4d34b2338a457e83730c6eeb42e4478823ec39454bc80fdfa3dc8c55c83e7c0a
-
SHA512
4ac841062e68e9b7d1b102fedbb92f64d31a486227b5f438a287939612c985d36283f30d9809cec5da044509b26cd672b2b597daeed2a2f3afe4c28f6c96b070
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-