General
-
Target
5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9
-
Size
356KB
-
Sample
220725-bcfqhsgdem
-
MD5
9033eee5371a1f698df4fc10a809646f
-
SHA1
80f9cf201cfbeb89c67d69df7879c77db22b95ba
-
SHA256
5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9
-
SHA512
e4902f63b789cd9460a04fb3b704f53d1a6f1ecb2cd065c7a5bac9976fcef837edd3a3baa69fe1f4c19bee92ece1b3dffd475a6c75e2519260973de8e721cebb
Static task
static1
Behavioral task
behavioral1
Sample
5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\_ReCoVeRy_+mqtka.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/6BA45D4DA28C911D
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/6BA45D4DA28C911D
http://yyre45dbvn2nhbefbmh.begumvelic.at/6BA45D4DA28C911D
http://xlowfznrg4wf7dli.ONION/6BA45D4DA28C911D
Extracted
C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\_ReCoVeRy_+mqtka.html
Extracted
C:\$Recycle.Bin\S-1-5-21-1101907861-274115917-2188613224-1000\_ReCoVeRy_+peemn.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F08A97FCEA111DED
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/F08A97FCEA111DED
http://yyre45dbvn2nhbefbmh.begumvelic.at/F08A97FCEA111DED
http://xlowfznrg4wf7dli.ONION/F08A97FCEA111DED
Extracted
C:\$Recycle.Bin\S-1-5-21-1101907861-274115917-2188613224-1000\_ReCoVeRy_+peemn.html
Targets
-
-
Target
5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9
-
Size
356KB
-
MD5
9033eee5371a1f698df4fc10a809646f
-
SHA1
80f9cf201cfbeb89c67d69df7879c77db22b95ba
-
SHA256
5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9
-
SHA512
e4902f63b789cd9460a04fb3b704f53d1a6f1ecb2cd065c7a5bac9976fcef837edd3a3baa69fe1f4c19bee92ece1b3dffd475a6c75e2519260973de8e721cebb
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-