General
-
Target
2025-04-03_489136e46e31d5be5c1dcfefd7dbb221_amadey_smoke-loader_teslacrypt
-
Size
251KB
-
Sample
250403-cxtcsaxvaz
-
MD5
489136e46e31d5be5c1dcfefd7dbb221
-
SHA1
48145bfb513ab5559612b92250dd9ec03b9da733
-
SHA256
505d66bbcc6926ba3f5c2393e2556ea8256b6e7f2ec63ac29a4596fbe594403b
-
SHA512
0626a84ec57f16912cab610875746956b38d0ccb46e56de06216e32db4749af81c22838f094968085b53e4451f60e0a7ad2894efa1ae09955c42f310a191903a
-
SSDEEP
3072:yP36YQgDABWbDFp7yz5hwXZwnt+XOCGNjYQohl5ZieMhJP7p9ne3ESTRpA6:OZyTntxVYQE5ehJP7p9e3EcXA6
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-03_489136e46e31d5be5c1dcfefd7dbb221_amadey_smoke-loader_teslacrypt.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\Users\Recovery+hsweh.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/91D61240964C59F
http://tes543berda73i48fsdfsd.keratadze.at/91D61240964C59F
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/91D61240964C59F
http://xlowfznrg4wf7dli.ONION/91D61240964C59F
Targets
-
-
Target
2025-04-03_489136e46e31d5be5c1dcfefd7dbb221_amadey_smoke-loader_teslacrypt
-
Size
251KB
-
MD5
489136e46e31d5be5c1dcfefd7dbb221
-
SHA1
48145bfb513ab5559612b92250dd9ec03b9da733
-
SHA256
505d66bbcc6926ba3f5c2393e2556ea8256b6e7f2ec63ac29a4596fbe594403b
-
SHA512
0626a84ec57f16912cab610875746956b38d0ccb46e56de06216e32db4749af81c22838f094968085b53e4451f60e0a7ad2894efa1ae09955c42f310a191903a
-
SSDEEP
3072:yP36YQgDABWbDFp7yz5hwXZwnt+XOCGNjYQohl5ZieMhJP7p9ne3ESTRpA6:OZyTntxVYQE5ehJP7p9e3EcXA6
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (900) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1