General

  • Target

    94756c3e412425c99b27b4b02dac113fe291a750591fb98f1db95713bb59a6b2

  • Size

    9.8MB

  • Sample

    220328-vv5l5sggdr

  • MD5

    57d2f66c766cf46c3986677332fafec5

  • SHA1

    c51ecb5e89595bb6c7b1333e03bcef388d472426

  • SHA256

    94756c3e412425c99b27b4b02dac113fe291a750591fb98f1db95713bb59a6b2

  • SHA512

    2360aa880fb32fd681d79da6fdbfc7fa598472eaa9ba7d20c186f27d92d7084b820da6e69db2eda075217c2553907ed56507c7538428374dc56c6dd91c9ec725

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 1MPeTatAjrZTMH6kpeiHUPrDpgdRgvd7bD Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

1MPeTatAjrZTMH6kpeiHUPrDpgdRgvd7bD

Targets

    • Target

      94756c3e412425c99b27b4b02dac113fe291a750591fb98f1db95713bb59a6b2

    • Size

      9.8MB

    • MD5

      57d2f66c766cf46c3986677332fafec5

    • SHA1

      c51ecb5e89595bb6c7b1333e03bcef388d472426

    • SHA256

      94756c3e412425c99b27b4b02dac113fe291a750591fb98f1db95713bb59a6b2

    • SHA512

      2360aa880fb32fd681d79da6fdbfc7fa598472eaa9ba7d20c186f27d92d7084b820da6e69db2eda075217c2553907ed56507c7538428374dc56c6dd91c9ec725

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • XMRig Miner Payload

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks