SYMBOLCOMMON_NAMEaka. SYNONYMS
win.teslacrypt (Back to overview)

TeslaCrypt

aka: cryptesla
URLhaus    

There is no description at this point.

References
2021-02-05Trend MicroRaphael Centeno, Monte de Jesus, Don Ovid Ladores, Junestherry Salvador, Nikko Tamana, Llalum Victoria
@online{centeno:20210205:new:33e89f1, author = {Raphael Centeno and Monte de Jesus and Don Ovid Ladores and Junestherry Salvador and Nikko Tamana and Llalum Victoria}, title = {{New in Ransomware: Seth-Locker, Babuk Locker, Maoloa, TeslaCrypt, and CobraLocker}}, date = {2021-02-05}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/21/b/new-in-ransomware.html}, language = {English}, urldate = {2021-02-09} } New in Ransomware: Seth-Locker, Babuk Locker, Maoloa, TeslaCrypt, and CobraLocker
Babuk TeslaCrypt
2020-09-02RiskIQJordan Herman
@online{herman:20200902:inter:93b8c50, author = {Jordan Herman}, title = {{The Inter Skimmer Kit}}, date = {2020-09-02}, organization = {RiskIQ}, url = {https://community.riskiq.com/article/30f22a00}, language = {English}, urldate = {2020-09-04} } The Inter Skimmer Kit
magecart DreamBot TeslaCrypt
2019-03-25Trend MicroTrendmicro
@online{trendmicro:20190325:emerging:e4fbb23, author = {Trendmicro}, title = {{Emerging Threat on RANSOM_CRYPTESLA}}, date = {2019-03-25}, organization = {Trend Micro}, url = {https://success.trendmicro.com/solution/1113900-emerging-threat-on-ransom-cryptesla}, language = {English}, urldate = {2020-01-08} } Emerging Threat on RANSOM_CRYPTESLA
TeslaCrypt
2017-06-05Christophe Tafani-Dereeper
@online{tafanidereeper:20170605:set:fb5e95c, author = {Christophe Tafani-Dereeper}, title = {{Set up your own malware analysis lab with VirtualBox, INetSim and Burp}}, date = {2017-06-05}, url = {https://blog.christophetd.fr/malware-analysis-lab-with-virtualbox-inetsim-and-burp/}, language = {English}, urldate = {2020-02-27} } Set up your own malware analysis lab with VirtualBox, INetSim and Burp
TeslaCrypt
2016-05Check PointStanislav Skuratovich
@techreport{skuratovich:201605:looking:0c23f31, author = {Stanislav Skuratovich}, title = {{Looking into Teslacrypt}}, date = {2016-05}, institution = {Check Point}, url = {https://blog.checkpoint.com/wp-content/uploads/2016/05/Tesla-crypt-whitepaper_V3.pdf}, language = {English}, urldate = {2019-12-06} } Looking into Teslacrypt
TeslaCrypt
2016-04-19EndgameMark Mager
@online{mager:20160419:your:df8bb48, author = {Mark Mager}, title = {{Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain}}, date = {2016-04-19}, organization = {Endgame}, url = {https://www.endgame.com/blog/technical-blog/your-package-has-been-successfully-encrypted-teslacrypt-41a-and-malware-attack}, language = {English}, urldate = {2020-01-13} } Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain
TeslaCrypt
2016-03-18MalwarebytesMalwarebytes Labs
@online{labs:20160318:teslacrypt:5c7daff, author = {Malwarebytes Labs}, title = {{Teslacrypt Spam Campaign: “Unpaid Issue…”}}, date = {2016-03-18}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2016/03/teslacrypt-spam-campaign-unpaid-issue/}, language = {English}, urldate = {2019-12-20} } Teslacrypt Spam Campaign: “Unpaid Issue…”
TeslaCrypt
2015-12-16ESET ResearchJosep Albors
@online{albors:20151216:nemucod:b1c1305, author = {Josep Albors}, title = {{Nemucod malware spreads ransomware Teslacrypt around the world}}, date = {2015-12-16}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2015/12/16/nemucod-malware-spreads-ransomware-teslacrypt-around-world/}, language = {English}, urldate = {2019-11-14} } Nemucod malware spreads ransomware Teslacrypt around the world
TeslaCrypt
2015-10-09Palo Alto Networks Unit 42Josh Grunzweig
@online{grunzweig:20151009:latest:c328965, author = {Josh Grunzweig}, title = {{Latest TeslaCrypt Ransomware Borrows Code From Carberp Trojan}}, date = {2015-10-09}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2015/10/latest-teslacrypt-ransomware-borrows-code-from-carberp-trojan/}, language = {English}, urldate = {2019-12-20} } Latest TeslaCrypt Ransomware Borrows Code From Carberp Trojan
TeslaCrypt
2015-07-14Kaspersky LabsFedor Sinitsyn
@online{sinitsyn:20150714:teslacrypt:9ad5fb1, author = {Fedor Sinitsyn}, title = {{TeslaCrypt 2.0 disguised as CryptoWall}}, date = {2015-07-14}, organization = {Kaspersky Labs}, url = {https://securelist.com/teslacrypt-2-0-disguised-as-cryptowall/71371/}, language = {English}, urldate = {2019-12-20} } TeslaCrypt 2.0 disguised as CryptoWall
TeslaCrypt
2015-04-27Cisco TalosAndrea Allievi, Earl Carter, Emmanuel Tacheau
@online{allievi:20150427:threat:3754b13, author = {Andrea Allievi and Earl Carter and Emmanuel Tacheau}, title = {{Threat Spotlight: TeslaCrypt – Decrypt It Yourself}}, date = {2015-04-27}, organization = {Cisco Talos}, url = {https://blogs.cisco.com/security/talos/teslacrypt}, language = {English}, urldate = {2019-10-15} } Threat Spotlight: TeslaCrypt – Decrypt It Yourself
TeslaCrypt
Yara Rules
[TLP:WHITE] win_teslacrypt_auto (20230125 | Detects win.teslacrypt.)
rule win_teslacrypt_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-01-25"
        version = "1"
        description = "Detects win.teslacrypt."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.teslacrypt"
        malpedia_rule_date = "20230124"
        malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686"
        malpedia_version = "20230125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 51 52 8b5570 0fb6c8 }
            // n = 4, score = 900
            //   51                   | push                ecx
            //   52                   | push                edx
            //   8b5570               | mov                 edx, dword ptr [ebp + 0x70]
            //   0fb6c8               | movzx               ecx, al

        $sequence_1 = { 51 52 8b5550 0fb6c8 }
            // n = 4, score = 900
            //   51                   | push                ecx
            //   52                   | push                edx
            //   8b5550               | mov                 edx, dword ptr [ebp + 0x50]
            //   0fb6c8               | movzx               ecx, al

        $sequence_2 = { 334500 335d04 8b542418 8902 895a04 897208 897a0c }
            // n = 7, score = 900
            //   334500               | xor                 eax, dword ptr [ebp]
            //   335d04               | xor                 ebx, dword ptr [ebp + 4]
            //   8b542418             | mov                 edx, dword ptr [esp + 0x18]
            //   8902                 | mov                 dword ptr [edx], eax
            //   895a04               | mov                 dword ptr [edx + 4], ebx
            //   897208               | mov                 dword ptr [edx + 8], esi
            //   897a0c               | mov                 dword ptr [edx + 0xc], edi

        $sequence_3 = { 55 53 56 57 8b6c2418 c785f0000000e0000000 8b5c2414 }
            // n = 7, score = 900
            //   55                   | push                ebp
            //   53                   | push                ebx
            //   56                   | push                esi
            //   57                   | push                edi
            //   8b6c2418             | mov                 ebp, dword ptr [esp + 0x18]
            //   c785f0000000e0000000     | mov    dword ptr [ebp + 0xf0], 0xe0
            //   8b5c2414             | mov                 ebx, dword ptr [esp + 0x14]

        $sequence_4 = { 335d04 83c510 8b7508 8b7d0c 55 c1c310 0fb6e9 }
            // n = 7, score = 900
            //   335d04               | xor                 ebx, dword ptr [ebp + 4]
            //   83c510               | add                 ebp, 0x10
            //   8b7508               | mov                 esi, dword ptr [ebp + 8]
            //   8b7d0c               | mov                 edi, dword ptr [ebp + 0xc]
            //   55                   | push                ebp
            //   c1c310               | rol                 ebx, 0x10
            //   0fb6e9               | movzx               ebp, cl

        $sequence_5 = { 56 57 8b742414 8b06 8b5e04 8b4e08 8b560c }
            // n = 7, score = 900
            //   56                   | push                esi
            //   57                   | push                edi
            //   8b742414             | mov                 esi, dword ptr [esp + 0x14]
            //   8b06                 | mov                 eax, dword ptr [esi]
            //   8b5e04               | mov                 ebx, dword ptr [esi + 4]
            //   8b4e08               | mov                 ecx, dword ptr [esi + 8]
            //   8b560c               | mov                 edx, dword ptr [esi + 0xc]

        $sequence_6 = { 338594000000 8985b4000000 338598000000 8985b8000000 33859c000000 }
            // n = 5, score = 900
            //   338594000000         | xor                 eax, dword ptr [ebp + 0x94]
            //   8985b4000000         | mov                 dword ptr [ebp + 0xb4], eax
            //   338598000000         | xor                 eax, dword ptr [ebp + 0x98]
            //   8985b8000000         | mov                 dword ptr [ebp + 0xb8], eax
            //   33859c000000         | xor                 eax, dword ptr [ebp + 0x9c]

        $sequence_7 = { 0f84ae010000 81ffe0000000 740a b8ffffffff e9???????? 83c510 8b7508 }
            // n = 7, score = 900
            //   0f84ae010000         | je                  0x1b4
            //   81ffe0000000         | cmp                 edi, 0xe0
            //   740a                 | je                  0xc
            //   b8ffffffff           | mov                 eax, 0xffffffff
            //   e9????????           |                     
            //   83c510               | add                 ebp, 0x10
            //   8b7508               | mov                 esi, dword ptr [ebp + 8]

        $sequence_8 = { 8b91c0000000 8bb1c4000000 8b3d???????? 8b5f4c 891c24 89442430 8954242c }
            // n = 7, score = 100
            //   8b91c0000000         | mov                 edx, dword ptr [ecx + 0xc0]
            //   8bb1c4000000         | mov                 esi, dword ptr [ecx + 0xc4]
            //   8b3d????????         |                     
            //   8b5f4c               | mov                 ebx, dword ptr [edi + 0x4c]
            //   891c24               | mov                 dword ptr [esp], ebx
            //   89442430             | mov                 dword ptr [esp + 0x30], eax
            //   8954242c             | mov                 dword ptr [esp + 0x2c], edx

        $sequence_9 = { 89442418 83c434 5e 5f 5b c3 }
            // n = 6, score = 100
            //   89442418             | mov                 dword ptr [esp + 0x18], eax
            //   83c434               | add                 esp, 0x34
            //   5e                   | pop                 esi
            //   5f                   | pop                 edi
            //   5b                   | pop                 ebx
            //   c3                   | ret                 

        $sequence_10 = { e8???????? 89e0 8d8c24b8000000 89480c 8b4c2468 8908 }
            // n = 6, score = 100
            //   e8????????           |                     
            //   89e0                 | mov                 eax, esp
            //   8d8c24b8000000       | lea                 ecx, [esp + 0xb8]
            //   89480c               | mov                 dword ptr [eax + 0xc], ecx
            //   8b4c2468             | mov                 ecx, dword ptr [esp + 0x68]
            //   8908                 | mov                 dword ptr [eax], ecx

        $sequence_11 = { 83fa00 89442418 894c2414 89542410 7d23 8b442410 25ffff0000 }
            // n = 7, score = 100
            //   83fa00               | cmp                 edx, 0
            //   89442418             | mov                 dword ptr [esp + 0x18], eax
            //   894c2414             | mov                 dword ptr [esp + 0x14], ecx
            //   89542410             | mov                 dword ptr [esp + 0x10], edx
            //   7d23                 | jge                 0x25
            //   8b442410             | mov                 eax, dword ptr [esp + 0x10]
            //   25ffff0000           | and                 eax, 0xffff

        $sequence_12 = { 31c9 8b54247c 8b7250 8b7c2468 893c24 c744240400000000 }
            // n = 6, score = 100
            //   31c9                 | xor                 ecx, ecx
            //   8b54247c             | mov                 edx, dword ptr [esp + 0x7c]
            //   8b7250               | mov                 esi, dword ptr [edx + 0x50]
            //   8b7c2468             | mov                 edi, dword ptr [esp + 0x68]
            //   893c24               | mov                 dword ptr [esp], edi
            //   c744240400000000     | mov                 dword ptr [esp + 4], 0

        $sequence_13 = { 897c2430 8974242c 0f84d3000000 8b44243c 83c008 8b4c242c }
            // n = 6, score = 100
            //   897c2430             | mov                 dword ptr [esp + 0x30], edi
            //   8974242c             | mov                 dword ptr [esp + 0x2c], esi
            //   0f84d3000000         | je                  0xd9
            //   8b44243c             | mov                 eax, dword ptr [esp + 0x3c]
            //   83c008               | add                 eax, 8
            //   8b4c242c             | mov                 ecx, dword ptr [esp + 0x2c]

        $sequence_14 = { 89442404 75ad 8a442403 a801 7505 e9???????? 8b44240c }
            // n = 7, score = 100
            //   89442404             | mov                 dword ptr [esp + 4], eax
            //   75ad                 | jne                 0xffffffaf
            //   8a442403             | mov                 al, byte ptr [esp + 3]
            //   a801                 | test                al, 1
            //   7505                 | jne                 7
            //   e9????????           |                     
            //   8b44240c             | mov                 eax, dword ptr [esp + 0xc]

        $sequence_15 = { e8???????? 8b4c2468 8b54247c 034a44 8b726c 89b42480000000 }
            // n = 6, score = 100
            //   e8????????           |                     
            //   8b4c2468             | mov                 ecx, dword ptr [esp + 0x68]
            //   8b54247c             | mov                 edx, dword ptr [esp + 0x7c]
            //   034a44               | add                 ecx, dword ptr [edx + 0x44]
            //   8b726c               | mov                 esi, dword ptr [edx + 0x6c]
            //   89b42480000000       | mov                 dword ptr [esp + 0x80], esi

    condition:
        7 of them and filesize < 1187840
}
Download all Yara Rules