General
-
Target
4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8
-
Size
371KB
-
Sample
220712-egv8jsaacl
-
MD5
2c5ed4b464979c52cc09368c97604f38
-
SHA1
2db032be1a52a744190c3c8814f35977362ed45b
-
SHA256
4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8
-
SHA512
d4b74607ed95b12868bcfddf2d1ec26fd6df7a13f59c6a200b6fcdadbfe3fbb3c7dbd09150fe8bd7129c87a7fac2dfe1fad26f9cbf13cec5de0f670b49e1a195
Static task
static1
Behavioral task
behavioral1
Sample
4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_RECoVERY_+vwahf.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/A5C941D8C6BD537D
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/A5C941D8C6BD537D
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/A5C941D8C6BD537D
http://xlowfznrg4wf7dli.ONION/A5C941D8C6BD537D
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_RECoVERY_+ovhrw.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/65B5E7114134A72C
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/65B5E7114134A72C
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/65B5E7114134A72C
http://xlowfznrg4wf7dli.ONION/65B5E7114134A72C
Targets
-
-
Target
4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8
-
Size
371KB
-
MD5
2c5ed4b464979c52cc09368c97604f38
-
SHA1
2db032be1a52a744190c3c8814f35977362ed45b
-
SHA256
4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8
-
SHA512
d4b74607ed95b12868bcfddf2d1ec26fd6df7a13f59c6a200b6fcdadbfe3fbb3c7dbd09150fe8bd7129c87a7fac2dfe1fad26f9cbf13cec5de0f670b49e1a195
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-