General
-
Target
49a66e6f2593e3b051800da0f132e15f207658f9cbf73d5d856e5bf8ce9a79fc
-
Size
500KB
-
Sample
220712-thdr8ahbfj
-
MD5
5cd7bede9ec531b606d9f292f15f9779
-
SHA1
6f0390dcf5427d683c2c7335fa57504c2446561b
-
SHA256
49a66e6f2593e3b051800da0f132e15f207658f9cbf73d5d856e5bf8ce9a79fc
-
SHA512
c98228cb238c96dd1b18c2c9671b84b7996ca01605a0b42e9a78166781f09e544e348742fa1084e86c24afefbbf3ff47ec7a148faf014e6168ac8e58c2a52834
Static task
static1
Behavioral task
behavioral1
Sample
49a66e6f2593e3b051800da0f132e15f207658f9cbf73d5d856e5bf8ce9a79fc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
49a66e6f2593e3b051800da0f132e15f207658f9cbf73d5d856e5bf8ce9a79fc.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+frcgp.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F5CFBA7734A3631
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/F5CFBA7734A3631
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/F5CFBA7734A3631
http://xlowfznrg4wf7dli.ONION/F5CFBA7734A3631
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+frcgp.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+pmrih.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/66A169BA5B2E458A
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/66A169BA5B2E458A
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/66A169BA5B2E458A
http://xlowfznrg4wf7dli.ONION/66A169BA5B2E458A
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+pmrih.html
Targets
-
-
Target
49a66e6f2593e3b051800da0f132e15f207658f9cbf73d5d856e5bf8ce9a79fc
-
Size
500KB
-
MD5
5cd7bede9ec531b606d9f292f15f9779
-
SHA1
6f0390dcf5427d683c2c7335fa57504c2446561b
-
SHA256
49a66e6f2593e3b051800da0f132e15f207658f9cbf73d5d856e5bf8ce9a79fc
-
SHA512
c98228cb238c96dd1b18c2c9671b84b7996ca01605a0b42e9a78166781f09e544e348742fa1084e86c24afefbbf3ff47ec7a148faf014e6168ac8e58c2a52834
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-