General
-
Target
58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db
-
Size
360KB
-
Sample
220724-gj8mrshebn
-
MD5
7ef2ee7c53fe41db4e1b17674ceab984
-
SHA1
e961deef333563a226b7214799e92d1f51895c5a
-
SHA256
58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db
-
SHA512
d122530a31fe196711a12bfd458b211662a0fb44cc1eadaf97c91160ad9e0de094660bc93c3e05b1be15b9ed3ffffd2c915ad4b934c43b69b442c4c455b99dbb
Static task
static1
Behavioral task
behavioral1
Sample
58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\_RECoVERY_+amciw.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/BAE18F32BA89A3C6
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/BAE18F32BA89A3C6
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/BAE18F32BA89A3C6
http://xlowfznrg4wf7dli.ONION/BAE18F32BA89A3C6
Extracted
C:\$Recycle.Bin\S-1-5-21-1101907861-274115917-2188613224-1000\_RECoVERY_+msgmx.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/BB8321E6A1CE69F6
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/BB8321E6A1CE69F6
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/BB8321E6A1CE69F6
http://xlowfznrg4wf7dli.ONION/BB8321E6A1CE69F6
Targets
-
-
Target
58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db
-
Size
360KB
-
MD5
7ef2ee7c53fe41db4e1b17674ceab984
-
SHA1
e961deef333563a226b7214799e92d1f51895c5a
-
SHA256
58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db
-
SHA512
d122530a31fe196711a12bfd458b211662a0fb44cc1eadaf97c91160ad9e0de094660bc93c3e05b1be15b9ed3ffffd2c915ad4b934c43b69b442c4c455b99dbb
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-