General
-
Target
lighthouse_teslacrypt_ransomware.mp4
-
Size
3.1MB
-
Sample
250108-l1h6naxmfq
-
MD5
577c4a77455c945bf638349a16aa9b47
-
SHA1
ff9139369ebf187e64c86348132dfb5f20bd4ac9
-
SHA256
c7503cdbc638d4886e9b06942b9afc345f041663734963b49fb25e1577287c46
-
SHA512
64a5510ca8c19915c9a88a524ca12731d2cb7b672d84f9db58c0aac7e39e1d89cf50981078dbcb905fd75f259124b9aee055e2d6fc95387023345c770313283c
-
SSDEEP
49152:pHZUdEm4AOcOgifdrIstug5mBdNUQIAfe3o7DDeh+HAjADJEsgBUEG5o5OpaRWC3:pHZA74A9UfOCmHIRoDeCJDGVBvG5o5O0
Static task
static1
Behavioral task
behavioral1
Sample
lighthouse_teslacrypt_ransomware.mp4
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lighthouse_teslacrypt_ransomware.mp4
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+kbhmr.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/2D153632C1DC9A15
http://tes543berda73i48fsdfsd.keratadze.at/2D153632C1DC9A15
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/2D153632C1DC9A15
http://xlowfznrg4wf7dli.ONION/2D153632C1DC9A15
Targets
-
-
Target
lighthouse_teslacrypt_ransomware.mp4
-
Size
3.1MB
-
MD5
577c4a77455c945bf638349a16aa9b47
-
SHA1
ff9139369ebf187e64c86348132dfb5f20bd4ac9
-
SHA256
c7503cdbc638d4886e9b06942b9afc345f041663734963b49fb25e1577287c46
-
SHA512
64a5510ca8c19915c9a88a524ca12731d2cb7b672d84f9db58c0aac7e39e1d89cf50981078dbcb905fd75f259124b9aee055e2d6fc95387023345c770313283c
-
SSDEEP
49152:pHZUdEm4AOcOgifdrIstug5mBdNUQIAfe3o7DDeh+HAjADJEsgBUEG5o5OpaRWC3:pHZA74A9UfOCmHIRoDeCJDGVBvG5o5O0
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (423) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Deobfuscate/Decode Files or Information
1Indicator Removal
2File Deletion
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1