General
-
Target
592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964
-
Size
384KB
-
Sample
220724-fqwq4sgabp
-
MD5
1b3d2d2e5f98531456a561f0556b9e06
-
SHA1
34b9baffc913ac2c23df1982b8a09e9dad707b7f
-
SHA256
592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964
-
SHA512
dc972d6741d1ceb475007c782f351bd6895c2669c1c2fb7793085fe54315388c47157bde82caf3273ad56ce7774d931f2c540e7d59593212425a9aaa87b3954b
Static task
static1
Behavioral task
behavioral1
Sample
592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\Recovery+yevoa.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/FB5172C50A3F4A3
http://kkd47eh4hdjshb5t.angortra.at/FB5172C50A3F4A3
http://ytrest84y5i456hghadefdsd.pontogrot.com/FB5172C50A3F4A3
http://xlowfznrg4wf7dli.ONION/FB5172C50A3F4A3
Extracted
C:\$Recycle.Bin\S-1-5-21-2660308776-3705150086-26593515-1000\Recovery+yhyiu.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/43378E7D702CF97E
http://kkd47eh4hdjshb5t.angortra.at/43378E7D702CF97E
http://ytrest84y5i456hghadefdsd.pontogrot.com/43378E7D702CF97E
http://xlowfznrg4wf7dli.ONION/43378E7D702CF97E
Targets
-
-
Target
592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964
-
Size
384KB
-
MD5
1b3d2d2e5f98531456a561f0556b9e06
-
SHA1
34b9baffc913ac2c23df1982b8a09e9dad707b7f
-
SHA256
592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964
-
SHA512
dc972d6741d1ceb475007c782f351bd6895c2669c1c2fb7793085fe54315388c47157bde82caf3273ad56ce7774d931f2c540e7d59593212425a9aaa87b3954b
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-