General
-
Target
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6
-
Size
419KB
-
Sample
220712-pk7qvscga3
-
MD5
52d3ab3e5431244512b9777cf9c43e6f
-
SHA1
8b4c82d5e39e0f826f3c8e8377aa3f4e9a5b515a
-
SHA256
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6
-
SHA512
18d78bffb7add66d489f2cc8ad3409ef232271dcfd40efae902df44e1853f4225ecdc35f54f196ede90656b3066ba9c72a6e3d0bddb1445fd08f6468d4b4f065
Static task
static1
Behavioral task
behavioral1
Sample
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+awwmf.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/6892350BC7CA2A6
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/6892350BC7CA2A6
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/6892350BC7CA2A6
http://xlowfznrg4wf7dli.ONION/6892350BC7CA2A6
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_RECoVERY_+uctex.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/83E58149C5B0B4AD
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/83E58149C5B0B4AD
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/83E58149C5B0B4AD
http://xlowfznrg4wf7dli.ONION/83E58149C5B0B4AD
Targets
-
-
Target
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6
-
Size
419KB
-
MD5
52d3ab3e5431244512b9777cf9c43e6f
-
SHA1
8b4c82d5e39e0f826f3c8e8377aa3f4e9a5b515a
-
SHA256
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6
-
SHA512
18d78bffb7add66d489f2cc8ad3409ef232271dcfd40efae902df44e1853f4225ecdc35f54f196ede90656b3066ba9c72a6e3d0bddb1445fd08f6468d4b4f065
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-