General
-
Target
5307f912093997ab9e09c1e98e389e5a9c5c5e0e84e11afa4a6e0eca4c7b893e
-
Size
304KB
-
Sample
220717-bg56zahha8
-
MD5
432872b2cf164b339b3e9b74d645ab55
-
SHA1
d4675b9fc6ac2032580abd6ff5a2917589adc11b
-
SHA256
5307f912093997ab9e09c1e98e389e5a9c5c5e0e84e11afa4a6e0eca4c7b893e
-
SHA512
0a0fd48f9ba86dbbf6b923eb8b90cf2de5cc24209acd55897ed994839b1bf8aaa2dc3adba7c39e1436d828b0d6a6ab5ab555f19a6d95e4e8cbd1f94b235dbe67
Static task
static1
Behavioral task
behavioral1
Sample
5307f912093997ab9e09c1e98e389e5a9c5c5e0e84e11afa4a6e0eca4c7b893e.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5307f912093997ab9e09c1e98e389e5a9c5c5e0e84e11afa4a6e0eca4c7b893e.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+heaey.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/A9E2B996C1F4DA90
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/A9E2B996C1F4DA90
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/A9E2B996C1F4DA90
http://xlowfznrg4wf7dli.ONION/A9E2B996C1F4DA90
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+heaey.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+oqmcr.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/74E0F72637ED143
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/74E0F72637ED143
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/74E0F72637ED143
http://xlowfznrg4wf7dli.ONION/74E0F72637ED143
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+oqmcr.html
Targets
-
-
Target
5307f912093997ab9e09c1e98e389e5a9c5c5e0e84e11afa4a6e0eca4c7b893e
-
Size
304KB
-
MD5
432872b2cf164b339b3e9b74d645ab55
-
SHA1
d4675b9fc6ac2032580abd6ff5a2917589adc11b
-
SHA256
5307f912093997ab9e09c1e98e389e5a9c5c5e0e84e11afa4a6e0eca4c7b893e
-
SHA512
0a0fd48f9ba86dbbf6b923eb8b90cf2de5cc24209acd55897ed994839b1bf8aaa2dc3adba7c39e1436d828b0d6a6ab5ab555f19a6d95e4e8cbd1f94b235dbe67
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-