General
-
Target
4932509bfc73e4ff0d7e54a10c5473172a2ece2c82d9db131fab5c99db996280
-
Size
360KB
-
Sample
220714-awsczsdhgk
-
MD5
76a3789daf65e3ce4e6ecd198b15e24c
-
SHA1
b922db959cf6f97f7e6f56900b552327add0140c
-
SHA256
4932509bfc73e4ff0d7e54a10c5473172a2ece2c82d9db131fab5c99db996280
-
SHA512
2650917aee8c284c71fa1e03db75611b37b818ab0ab701bdcb3da0eac2fb0eee3b4a1150447e44a0d4a1b9e03dc2e4b357ed0a6839218e3825455de86439b37a
Static task
static1
Behavioral task
behavioral1
Sample
4932509bfc73e4ff0d7e54a10c5473172a2ece2c82d9db131fab5c99db996280.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4932509bfc73e4ff0d7e54a10c5473172a2ece2c82d9db131fab5c99db996280.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_ReCoVeRy_+neuyu.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/B8FAB3F1C18D346
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/B8FAB3F1C18D346
http://yyre45dbvn2nhbefbmh.begumvelic.at/B8FAB3F1C18D346
http://xlowfznrg4wf7dli.ONION/B8FAB3F1C18D346
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_ReCoVeRy_+neuyu.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1081944012-3634099177-1681222835-1000\_ReCoVeRy_+hiojy.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/7E749775CA553841
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/7E749775CA553841
http://yyre45dbvn2nhbefbmh.begumvelic.at/7E749775CA553841
http://xlowfznrg4wf7dli.ONION/7E749775CA553841
Extracted
C:\$Recycle.Bin\S-1-5-21-1081944012-3634099177-1681222835-1000\_ReCoVeRy_+hiojy.html
Targets
-
-
Target
4932509bfc73e4ff0d7e54a10c5473172a2ece2c82d9db131fab5c99db996280
-
Size
360KB
-
MD5
76a3789daf65e3ce4e6ecd198b15e24c
-
SHA1
b922db959cf6f97f7e6f56900b552327add0140c
-
SHA256
4932509bfc73e4ff0d7e54a10c5473172a2ece2c82d9db131fab5c99db996280
-
SHA512
2650917aee8c284c71fa1e03db75611b37b818ab0ab701bdcb3da0eac2fb0eee3b4a1150447e44a0d4a1b9e03dc2e4b357ed0a6839218e3825455de86439b37a
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Drops file in System32 directory
-