2016-04-05 - TESLACRYPT RANSOMWARE ACTIVITY

NOTICE:

ASSOCIATED FILES:

 

NOTES:

 

EMAILS

EMAIL EXAMPLES:

 

ATTACHMENTS:

 

EXTRACTED .JS FILES:

 

TRAFFIC


Shown above:  Traffic from an infection filtered in Wireshark.

 

NOTE: I ran each of the extracted .js files on a host in my lab.  Notice the 3 different IP addresses for marvellrulesqq[.]com.

ASSOCIATED DOMAINS:

 

MALWARE

CONTENTS OF TODAY'S EMAIL AND MALWARE ARCHIVE:

 

IMAGES


Shown above:  An example of the Windows desktop infected with TeslaCrypt ransomware.

 

Click here to return to the main page.