General
-
Target
4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e
-
Size
308KB
-
Sample
220712-p1hfxadec6
-
MD5
90f3a27d1bef1b2a76190b7b33d0aaae
-
SHA1
a5f543122e5d917b38bb7d76895864ceb6599998
-
SHA256
4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e
-
SHA512
ad3c72839908bf8c1f4ce91987351f7febcec8df00c10a705cc49ef3015f335c49e8f8b54017a2ba6464e12a927edd11c79d980400ff58fa1af639229b949e43
Static task
static1
Behavioral task
behavioral1
Sample
4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\_ReCoVeRy_+amciw.txt
teslacrypt
http://t54ndnku456ngkwsudqer.wallymac.com/7F578D61299896E9
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/7F578D61299896E9
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/7F578D61299896E9
http://xlowfznrg4wf7dli.ONION/7F578D61299896E9
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\_ReCoVeRy_+amciw.html
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_ReCoVeRy_+hyjil.txt
teslacrypt
http://t54ndnku456ngkwsudqer.wallymac.com/7B5B1326172E7D
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/7B5B1326172E7D
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/7B5B1326172E7D
http://xlowfznrg4wf7dli.ONION/7B5B1326172E7D
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_ReCoVeRy_+hyjil.html
Targets
-
-
Target
4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e
-
Size
308KB
-
MD5
90f3a27d1bef1b2a76190b7b33d0aaae
-
SHA1
a5f543122e5d917b38bb7d76895864ceb6599998
-
SHA256
4a955bf5f2d4ea4f9bdcbe8c7ea6433ebba797548e8b6f3d0689711336bae75e
-
SHA512
ad3c72839908bf8c1f4ce91987351f7febcec8df00c10a705cc49ef3015f335c49e8f8b54017a2ba6464e12a927edd11c79d980400ff58fa1af639229b949e43
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-