General

  • Target

    Screenshot 2024-02-07 8.48.34 AM.png

  • Size

    133B

  • Sample

    240212-w3mlzace82

  • MD5

    521cacaaf22023ade44fd92e668c55e9

  • SHA1

    5e3acca0814fb0ac983e6b00d18bed03f4f2a7ba

  • SHA256

    28f0df75300f51c0a00238fecce626cb75d14ab368b31c3e34534ecf83219699

  • SHA512

    9ea36f0a70e99636dfd7e1343c289e1716ea6e7a71806165a3699722a0aa4541c544fdc1642e0723d0401229228da57a786a95fa31245a1fb1ce603645d003a4

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Targets

    • Target

      Screenshot 2024-02-07 8.48.34 AM.png

    • Size

      133B

    • MD5

      521cacaaf22023ade44fd92e668c55e9

    • SHA1

      5e3acca0814fb0ac983e6b00d18bed03f4f2a7ba

    • SHA256

      28f0df75300f51c0a00238fecce626cb75d14ab368b31c3e34534ecf83219699

    • SHA512

      9ea36f0a70e99636dfd7e1343c289e1716ea6e7a71806165a3699722a0aa4541c544fdc1642e0723d0401229228da57a786a95fa31245a1fb1ce603645d003a4

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand microsoft.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks