General
-
Target
4cefd600d958f0b88eef1cef0729713693c334263f71f01edcfb39f26c9bc634
-
Size
345KB
-
Sample
220712-e7d2ysdgc6
-
MD5
8161fc66fb09497071bdf39fe02ddb48
-
SHA1
1da039dacd62ac0f7816fc0251ab23106d5debc1
-
SHA256
4cefd600d958f0b88eef1cef0729713693c334263f71f01edcfb39f26c9bc634
-
SHA512
f2416baa41f0efb9136d4ce63bc8d9f529f0e1e7b05234c399025576f7d05db47507b123d92e9f225ffaf5a0d119d9dc980f65c7d8918a78cc04ac97da2f028c
Static task
static1
Behavioral task
behavioral1
Sample
4cefd600d958f0b88eef1cef0729713693c334263f71f01edcfb39f26c9bc634.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4cefd600d958f0b88eef1cef0729713693c334263f71f01edcfb39f26c9bc634.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_ReCoVeRy_+ucsks.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/D1C970AD5F4A80BD
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/D1C970AD5F4A80BD
http://yyre45dbvn2nhbefbmh.begumvelic.at/D1C970AD5F4A80BD
http://xlowfznrg4wf7dli.ONION/D1C970AD5F4A80BD
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_ReCoVeRy_+ucsks.html
Targets
-
-
Target
4cefd600d958f0b88eef1cef0729713693c334263f71f01edcfb39f26c9bc634
-
Size
345KB
-
MD5
8161fc66fb09497071bdf39fe02ddb48
-
SHA1
1da039dacd62ac0f7816fc0251ab23106d5debc1
-
SHA256
4cefd600d958f0b88eef1cef0729713693c334263f71f01edcfb39f26c9bc634
-
SHA512
f2416baa41f0efb9136d4ce63bc8d9f529f0e1e7b05234c399025576f7d05db47507b123d92e9f225ffaf5a0d119d9dc980f65c7d8918a78cc04ac97da2f028c
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Deletes itself
-
Adds Run key to start application
-