General
-
Target
4a06e0c0face5ed9d31164328a73d9cdc145a61945bfe4678e49d31d6ee34e2f
-
Size
360KB
-
Sample
220712-r73frsefhj
-
MD5
6ef1026b82ff5c587e4355a53c2c944e
-
SHA1
af5e5cdb2c1f58c2e020e07712a8d5cea162bbe3
-
SHA256
4a06e0c0face5ed9d31164328a73d9cdc145a61945bfe4678e49d31d6ee34e2f
-
SHA512
244ba69cc5d7300146cf83ec08b0e1e1fb255c569555e1c653b5ac1e42a5e7ceb64bdebb732c03261f80683423e44ae62ae3cd71130417a7531d59827986fe0f
Static task
static1
Behavioral task
behavioral1
Sample
4a06e0c0face5ed9d31164328a73d9cdc145a61945bfe4678e49d31d6ee34e2f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4a06e0c0face5ed9d31164328a73d9cdc145a61945bfe4678e49d31d6ee34e2f.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_RECOVERY_+flkut.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/56B084A310D02246
http://tes543berda73i48fsdfsd.keratadze.at/56B084A310D02246
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/56B084A310D02246
http://xlowfznrg4wf7dli.ONION/56B084A310D02246
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_RECOVERY_+oobbj.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/8CEA6C67DED556
http://tes543berda73i48fsdfsd.keratadze.at/8CEA6C67DED556
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/8CEA6C67DED556
http://xlowfznrg4wf7dli.ONION/8CEA6C67DED556
Targets
-
-
Target
4a06e0c0face5ed9d31164328a73d9cdc145a61945bfe4678e49d31d6ee34e2f
-
Size
360KB
-
MD5
6ef1026b82ff5c587e4355a53c2c944e
-
SHA1
af5e5cdb2c1f58c2e020e07712a8d5cea162bbe3
-
SHA256
4a06e0c0face5ed9d31164328a73d9cdc145a61945bfe4678e49d31d6ee34e2f
-
SHA512
244ba69cc5d7300146cf83ec08b0e1e1fb255c569555e1c653b5ac1e42a5e7ceb64bdebb732c03261f80683423e44ae62ae3cd71130417a7531d59827986fe0f
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-