General
-
Target
4be728c009492bba2a4039b170a530ab444b1bc5d1c03c9cf75db0433a6fd84c
-
Size
336KB
-
Sample
220712-kan4jsaabj
-
MD5
1044040e2bcda4d4070ab204b6c860c2
-
SHA1
21326628291f9df103f046135b97a3de73e818c4
-
SHA256
4be728c009492bba2a4039b170a530ab444b1bc5d1c03c9cf75db0433a6fd84c
-
SHA512
23ac2283db2c356a480cc2fd57858b49852a66615fc5adcfa31ad1b77968889879c9db980ac5ced595805160327bded2f31ea0c27ddf7aff12fbac4349fe659b
Static task
static1
Behavioral task
behavioral1
Sample
4be728c009492bba2a4039b170a530ab444b1bc5d1c03c9cf75db0433a6fd84c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4be728c009492bba2a4039b170a530ab444b1bc5d1c03c9cf75db0433a6fd84c.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+cqgmp.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/C92477733BA754AC
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/C92477733BA754AC
http://yyre45dbvn2nhbefbmh.begumvelic.at/C92477733BA754AC
http://xlowfznrg4wf7dli.ONION/C92477733BA754AC
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+cqgmp.html
Targets
-
-
Target
4be728c009492bba2a4039b170a530ab444b1bc5d1c03c9cf75db0433a6fd84c
-
Size
336KB
-
MD5
1044040e2bcda4d4070ab204b6c860c2
-
SHA1
21326628291f9df103f046135b97a3de73e818c4
-
SHA256
4be728c009492bba2a4039b170a530ab444b1bc5d1c03c9cf75db0433a6fd84c
-
SHA512
23ac2283db2c356a480cc2fd57858b49852a66615fc5adcfa31ad1b77968889879c9db980ac5ced595805160327bded2f31ea0c27ddf7aff12fbac4349fe659b
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-