General
-
Target
5a0e56ade0fd3259f3ee630111ba370a509a78e60d6e3cbd2c6a74ede64ab310
-
Size
360KB
-
Sample
220724-cf2b3aahgk
-
MD5
5d73b551f8c6abd194d9bffe8ec1968a
-
SHA1
ed3cceaee93ed29d06c05784cb870a56b529b148
-
SHA256
5a0e56ade0fd3259f3ee630111ba370a509a78e60d6e3cbd2c6a74ede64ab310
-
SHA512
3d996a38c15801ba9a96cee6bbb33128a9f5431102c2d3ca265f709269b54c12862d2a545951c0abba76ced582d90e57d226988fcc4ecdb4ba7dca36c43e0f7c
Static task
static1
Behavioral task
behavioral1
Sample
5a0e56ade0fd3259f3ee630111ba370a509a78e60d6e3cbd2c6a74ede64ab310.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5a0e56ade0fd3259f3ee630111ba370a509a78e60d6e3cbd2c6a74ede64ab310.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+ekorh.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/6AAA8587ADEAD4B3
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/6AAA8587ADEAD4B3
http://yyre45dbvn2nhbefbmh.begumvelic.at/6AAA8587ADEAD4B3
http://xlowfznrg4wf7dli.ONION/6AAA8587ADEAD4B3
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+ekorh.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1101907861-274115917-2188613224-1000\_ReCoVeRy_+vxuoq.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/B1EB93A6A6FA2113
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/B1EB93A6A6FA2113
http://yyre45dbvn2nhbefbmh.begumvelic.at/B1EB93A6A6FA2113
http://xlowfznrg4wf7dli.ONION/B1EB93A6A6FA2113
Extracted
C:\$Recycle.Bin\S-1-5-21-1101907861-274115917-2188613224-1000\_ReCoVeRy_+vxuoq.html
Targets
-
-
Target
5a0e56ade0fd3259f3ee630111ba370a509a78e60d6e3cbd2c6a74ede64ab310
-
Size
360KB
-
MD5
5d73b551f8c6abd194d9bffe8ec1968a
-
SHA1
ed3cceaee93ed29d06c05784cb870a56b529b148
-
SHA256
5a0e56ade0fd3259f3ee630111ba370a509a78e60d6e3cbd2c6a74ede64ab310
-
SHA512
3d996a38c15801ba9a96cee6bbb33128a9f5431102c2d3ca265f709269b54c12862d2a545951c0abba76ced582d90e57d226988fcc4ecdb4ba7dca36c43e0f7c
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-