General
-
Target
5227117f3742474e0da4a7c19d72935fc3a2b2f1875a4430d56ae80fcfb5c35d
-
Size
323KB
-
Sample
220717-eg1s2aehd6
-
MD5
4030ceb7c9ea72d03fe4e7a493bb20a9
-
SHA1
ef2f366d42c72ef2c369d4746afe35f978074e6a
-
SHA256
5227117f3742474e0da4a7c19d72935fc3a2b2f1875a4430d56ae80fcfb5c35d
-
SHA512
7cf39415a941e80284635c41d639aa614f864c3b34bfeb839386d1b20b6d25b64bed5def1d560d4a2946a3350700c3cc5ea9344780a78abdc26aabfefe6a85cb
Static task
static1
Behavioral task
behavioral1
Sample
5227117f3742474e0da4a7c19d72935fc3a2b2f1875a4430d56ae80fcfb5c35d.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5227117f3742474e0da4a7c19d72935fc3a2b2f1875a4430d56ae80fcfb5c35d.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+bfexm.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/976F3A7DC61FCBDA
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/976F3A7DC61FCBDA
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/976F3A7DC61FCBDA
http://xlowfznrg4wf7dli.ONION/976F3A7DC61FCBDA
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+bfexm.html
Targets
-
-
Target
5227117f3742474e0da4a7c19d72935fc3a2b2f1875a4430d56ae80fcfb5c35d
-
Size
323KB
-
MD5
4030ceb7c9ea72d03fe4e7a493bb20a9
-
SHA1
ef2f366d42c72ef2c369d4746afe35f978074e6a
-
SHA256
5227117f3742474e0da4a7c19d72935fc3a2b2f1875a4430d56ae80fcfb5c35d
-
SHA512
7cf39415a941e80284635c41d639aa614f864c3b34bfeb839386d1b20b6d25b64bed5def1d560d4a2946a3350700c3cc5ea9344780a78abdc26aabfefe6a85cb
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-