General
-
Target
52e13c80fdbd1cae03d0c7121443a06433af173a12c370325df22e97f9afd81e
-
Size
325KB
-
Sample
220717-b1ehcsbfaq
-
MD5
4638dcaef1732ca87b223ddf90ff4828
-
SHA1
1a2303d4521505c7c3fcd54ca1882240c4fc72e6
-
SHA256
52e13c80fdbd1cae03d0c7121443a06433af173a12c370325df22e97f9afd81e
-
SHA512
db00ec5f08801ae14a135e0de47ac6161c29dd3946234dc43fe7a649edb6a05dc572a76b35fe363df9e954033381158dc16dc63a2ae682537a13526be2ef1f3e
Static task
static1
Behavioral task
behavioral1
Sample
52e13c80fdbd1cae03d0c7121443a06433af173a12c370325df22e97f9afd81e.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
52e13c80fdbd1cae03d0c7121443a06433af173a12c370325df22e97f9afd81e.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\_ReCoVeRy_+ftvql.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/CBA0A4FF1DD257A6
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/CBA0A4FF1DD257A6
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/CBA0A4FF1DD257A6
http://xlowfznrg4wf7dli.ONION/CBA0A4FF1DD257A6
Extracted
C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\_ReCoVeRy_+ftvql.html
Targets
-
-
Target
52e13c80fdbd1cae03d0c7121443a06433af173a12c370325df22e97f9afd81e
-
Size
325KB
-
MD5
4638dcaef1732ca87b223ddf90ff4828
-
SHA1
1a2303d4521505c7c3fcd54ca1882240c4fc72e6
-
SHA256
52e13c80fdbd1cae03d0c7121443a06433af173a12c370325df22e97f9afd81e
-
SHA512
db00ec5f08801ae14a135e0de47ac6161c29dd3946234dc43fe7a649edb6a05dc572a76b35fe363df9e954033381158dc16dc63a2ae682537a13526be2ef1f3e
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-