General
-
Target
5a0ac24bdb5c72ab2adfae6a57b49c3e9d4667d9b05b3327120f340b8b1b5a64
-
Size
345KB
-
Sample
220724-cg5qwababm
-
MD5
546f923bdea9f07e9bcc7b658e6f4266
-
SHA1
9679a020f66e363b46e4113ef6d5c0e4f926a25b
-
SHA256
5a0ac24bdb5c72ab2adfae6a57b49c3e9d4667d9b05b3327120f340b8b1b5a64
-
SHA512
dceb9e39eebd4fd44b1373e4e14403c1ff0fbfb2a9170d1866cf25b1c091899f653a573e24feb3e119e6ad70563dab35218fea9a9f1352c662285e2c68bddce5
Static task
static1
Behavioral task
behavioral1
Sample
5a0ac24bdb5c72ab2adfae6a57b49c3e9d4667d9b05b3327120f340b8b1b5a64.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5a0ac24bdb5c72ab2adfae6a57b49c3e9d4667d9b05b3327120f340b8b1b5a64.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\_RECoVERY_+ajily.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/B9C28473FE4EB4
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/B9C28473FE4EB4
http://yyre45dbvn2nhbefbmh.begumvelic.at/B9C28473FE4EB4
http://xlowfznrg4wf7dli.ONION/B9C28473FE4EB4
Extracted
C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\_RECoVERY_+ajily.html
Targets
-
-
Target
5a0ac24bdb5c72ab2adfae6a57b49c3e9d4667d9b05b3327120f340b8b1b5a64
-
Size
345KB
-
MD5
546f923bdea9f07e9bcc7b658e6f4266
-
SHA1
9679a020f66e363b46e4113ef6d5c0e4f926a25b
-
SHA256
5a0ac24bdb5c72ab2adfae6a57b49c3e9d4667d9b05b3327120f340b8b1b5a64
-
SHA512
dceb9e39eebd4fd44b1373e4e14403c1ff0fbfb2a9170d1866cf25b1c091899f653a573e24feb3e119e6ad70563dab35218fea9a9f1352c662285e2c68bddce5
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-