General
-
Target
58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89
-
Size
340KB
-
Sample
220724-t7zqzsbcfl
-
MD5
668c2c58a444c028fbd491bc9afded1d
-
SHA1
c2cd569613182b71066af0b605f01dc6be8e8508
-
SHA256
58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89
-
SHA512
14f39f3eb2511724d2ac2cc3f33c332920be5626c34de52894adf59a2c003db713cb882d34169f24bc4797d0db5ce77d80e569194b303cb21baeca5dacf63175
Static task
static1
Behavioral task
behavioral1
Sample
58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\_RECOVERY_+mwvge.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/DED8BF88E6254092
http://tes543berda73i48fsdfsd.keratadze.at/DED8BF88E6254092
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/DED8BF88E6254092
http://xlowfznrg4wf7dli.ONION/DED8BF88E6254092
Extracted
C:\$Recycle.Bin\S-1-5-21-2660308776-3705150086-26593515-1000\_RECOVERY_+shwgu.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/9F66185F7F364A28
http://tes543berda73i48fsdfsd.keratadze.at/9F66185F7F364A28
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/9F66185F7F364A28
http://xlowfznrg4wf7dli.ONION/9F66185F7F364A28
Targets
-
-
Target
58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89
-
Size
340KB
-
MD5
668c2c58a444c028fbd491bc9afded1d
-
SHA1
c2cd569613182b71066af0b605f01dc6be8e8508
-
SHA256
58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89
-
SHA512
14f39f3eb2511724d2ac2cc3f33c332920be5626c34de52894adf59a2c003db713cb882d34169f24bc4797d0db5ce77d80e569194b303cb21baeca5dacf63175
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-