General
-
Target
4c1047afcf72657f290338efac15c4bb109735512edee5556f76307f975c4f68
-
Size
371KB
-
Sample
220712-jqd3vabfc5
-
MD5
3d1d21040e9d68cbf02e146ad0ad67eb
-
SHA1
1ba5dc500339977ef248125ccc8f6f66f3cb0f6f
-
SHA256
4c1047afcf72657f290338efac15c4bb109735512edee5556f76307f975c4f68
-
SHA512
bb14db6c812f3acd1777c10ad6fea24b4a3b10975d7f8811355d42bc493bddc3c07aa9129b065b061fe021473c64dc7da940885ba9bd42d59d9b1feefbe86865
Static task
static1
Behavioral task
behavioral1
Sample
4c1047afcf72657f290338efac15c4bb109735512edee5556f76307f975c4f68.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4c1047afcf72657f290338efac15c4bb109735512edee5556f76307f975c4f68.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_RECoVERY_+fcjay.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/A65B85DCF3D611E
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/A65B85DCF3D611E
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/A65B85DCF3D611E
http://xlowfznrg4wf7dli.ONION/A65B85DCF3D611E
Extracted
C:\$Recycle.Bin\S-1-5-21-1081944012-3634099177-1681222835-1000\_RECoVERY_+joort.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/BF3830E53875E99
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/BF3830E53875E99
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/BF3830E53875E99
http://xlowfznrg4wf7dli.ONION/BF3830E53875E99
Targets
-
-
Target
4c1047afcf72657f290338efac15c4bb109735512edee5556f76307f975c4f68
-
Size
371KB
-
MD5
3d1d21040e9d68cbf02e146ad0ad67eb
-
SHA1
1ba5dc500339977ef248125ccc8f6f66f3cb0f6f
-
SHA256
4c1047afcf72657f290338efac15c4bb109735512edee5556f76307f975c4f68
-
SHA512
bb14db6c812f3acd1777c10ad6fea24b4a3b10975d7f8811355d42bc493bddc3c07aa9129b065b061fe021473c64dc7da940885ba9bd42d59d9b1feefbe86865
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-