General
-
Target
4a6e3bd7acd26d0f34aa8faf112bda87635d5d7add7777d1bc160bd3781a517c
-
Size
416KB
-
Sample
220712-qjcprseed8
-
MD5
6d97decf011100391cefd3d9355b1e8e
-
SHA1
92c7a7e1d383c0cba6be05dc7230a2814d47ba57
-
SHA256
4a6e3bd7acd26d0f34aa8faf112bda87635d5d7add7777d1bc160bd3781a517c
-
SHA512
243e6922a0a6c6d656205a07dd4adeb50362d3d92f929185c5a2c638fc418fce7a70cd856eb1622aac98fe58a8f13e470eeaa2d28537bbe788be1b53b5a2b53a
Static task
static1
Behavioral task
behavioral1
Sample
4a6e3bd7acd26d0f34aa8faf112bda87635d5d7add7777d1bc160bd3781a517c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4a6e3bd7acd26d0f34aa8faf112bda87635d5d7add7777d1bc160bd3781a517c.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\_RECoVERY_+pifqa.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/FD35A02F296B4B4
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/FD35A02F296B4B4
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/FD35A02F296B4B4
http://xlowfznrg4wf7dli.ONION/FD35A02F296B4B4
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\_RECoVERY_+pifqa.html
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_RECoVERY_+ustuq.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/5C91B0F390133FF2
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/5C91B0F390133FF2
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/5C91B0F390133FF2
http://xlowfznrg4wf7dli.ONION/5C91B0F390133FF2
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_RECoVERY_+ustuq.html
Targets
-
-
Target
4a6e3bd7acd26d0f34aa8faf112bda87635d5d7add7777d1bc160bd3781a517c
-
Size
416KB
-
MD5
6d97decf011100391cefd3d9355b1e8e
-
SHA1
92c7a7e1d383c0cba6be05dc7230a2814d47ba57
-
SHA256
4a6e3bd7acd26d0f34aa8faf112bda87635d5d7add7777d1bc160bd3781a517c
-
SHA512
243e6922a0a6c6d656205a07dd4adeb50362d3d92f929185c5a2c638fc418fce7a70cd856eb1622aac98fe58a8f13e470eeaa2d28537bbe788be1b53b5a2b53a
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-