General
-
Target
473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9
-
Size
283KB
-
Sample
220714-h6r4zacahr
-
MD5
411b8d741dc16ceb2ad7f309304d79d7
-
SHA1
b8429977003d66f56ab1991bb0ffd5ae1653610c
-
SHA256
473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9
-
SHA512
80f2a384902490d22454e33964f9abd830a7ce417e21ed5abf4865c6a701ea9e1f2b48ed692ef89db2aad8be6fe5ec67b22e5af92814c8ad33f7dfa7b9a1d190
Static task
static1
Behavioral task
behavioral1
Sample
473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+cjsiu.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/A11C53F98FBE374
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/A11C53F98FBE374
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/A11C53F98FBE374
http://xlowfznrg4wf7dli.ONION/A11C53F98FBE374
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_ReCoVeRy_+cjsiu.html
Targets
-
-
Target
473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9
-
Size
283KB
-
MD5
411b8d741dc16ceb2ad7f309304d79d7
-
SHA1
b8429977003d66f56ab1991bb0ffd5ae1653610c
-
SHA256
473b4cbb63c0c8eaf16b63f35daeffbb90763fe1d902f2beb6ff91a3bf9484c9
-
SHA512
80f2a384902490d22454e33964f9abd830a7ce417e21ed5abf4865c6a701ea9e1f2b48ed692ef89db2aad8be6fe5ec67b22e5af92814c8ad33f7dfa7b9a1d190
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Deletes itself
-
Adds Run key to start application
-