General
-
Target
4ace7b3da6d042f34d583d057abdb503f0f56f746801cbb0383da5efe8e3239a
-
Size
325KB
-
Sample
220712-n7xczahcdr
-
MD5
28215a5ed45d61536d22322602407aeb
-
SHA1
d4db7b54acd5a8f2f7022f3f947ad79e0226801a
-
SHA256
4ace7b3da6d042f34d583d057abdb503f0f56f746801cbb0383da5efe8e3239a
-
SHA512
639ab48113f68f07e0573fcafac435aa5c41394572104a023f6c79ae33484a1b0c20765f7ffac2bf84e1ff715d0aacc08a927a24028d6863cdd0c31fad9896a5
Static task
static1
Behavioral task
behavioral1
Sample
4ace7b3da6d042f34d583d057abdb503f0f56f746801cbb0383da5efe8e3239a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4ace7b3da6d042f34d583d057abdb503f0f56f746801cbb0383da5efe8e3239a.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+nqtrx.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/9B1627686B7818F4
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/9B1627686B7818F4
http://yyre45dbvn2nhbefbmh.begumvelic.at/9B1627686B7818F4
http://xlowfznrg4wf7dli.ONION/9B1627686B7818F4
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+nqtrx.html
Targets
-
-
Target
4ace7b3da6d042f34d583d057abdb503f0f56f746801cbb0383da5efe8e3239a
-
Size
325KB
-
MD5
28215a5ed45d61536d22322602407aeb
-
SHA1
d4db7b54acd5a8f2f7022f3f947ad79e0226801a
-
SHA256
4ace7b3da6d042f34d583d057abdb503f0f56f746801cbb0383da5efe8e3239a
-
SHA512
639ab48113f68f07e0573fcafac435aa5c41394572104a023f6c79ae33484a1b0c20765f7ffac2bf84e1ff715d0aacc08a927a24028d6863cdd0c31fad9896a5
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-