General
-
Target
2024-04-22_2b11872b7e3ddc4e96682e597e406ac8_destroyer_wannacry
-
Size
27KB
-
Sample
240422-x5n39afb61
-
MD5
2b11872b7e3ddc4e96682e597e406ac8
-
SHA1
5f045aa9c4a5c46b96a85f5c382d33427e98b4cf
-
SHA256
df5a7564ad18463b2dafc86631ae4a120423a17efc32977532b41aac6b83febf
-
SHA512
19d6dc254d0bb54d42a0cc11e861fa2e0fd69793a3e8f67332d8f6d8debb9a88c808c3bca4dd8caa2c5c21c9b5c1c182d97ab64c08c0c62ac8c186d64a201269
-
SSDEEP
384:xtWZPzzxAm1vFzaGh2r7OUmgFRYfdQPyRlZOy5o91Tecv82v4:47zxAmuGUrEgnYwWho95eI82w
Behavioral task
behavioral1
Sample
2024-04-22_2b11872b7e3ddc4e96682e597e406ac8_destroyer_wannacry.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-22_2b11872b7e3ddc4e96682e597e406ac8_destroyer_wannacry.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\read_it.txt
1FcQuP9kvbQDuvwFxj6aguLBVvnfwbv5R2
Targets
-
-
Target
2024-04-22_2b11872b7e3ddc4e96682e597e406ac8_destroyer_wannacry
-
Size
27KB
-
MD5
2b11872b7e3ddc4e96682e597e406ac8
-
SHA1
5f045aa9c4a5c46b96a85f5c382d33427e98b4cf
-
SHA256
df5a7564ad18463b2dafc86631ae4a120423a17efc32977532b41aac6b83febf
-
SHA512
19d6dc254d0bb54d42a0cc11e861fa2e0fd69793a3e8f67332d8f6d8debb9a88c808c3bca4dd8caa2c5c21c9b5c1c182d97ab64c08c0c62ac8c186d64a201269
-
SSDEEP
384:xtWZPzzxAm1vFzaGh2r7OUmgFRYfdQPyRlZOy5o91Tecv82v4:47zxAmuGUrEgnYwWho95eI82w
Score10/10-
Chaos Ransomware
-
Detects command variations typically used by ransomware
-
Detects executables containing many references to VEEAM. Observed in ransomware
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-