General

  • Target

    2024-05-29_bf6068f9bdc676df304694e1c181334f_chaos_destroyer_wannacry

  • Size

    24KB

  • Sample

    240529-bth7zadf28

  • MD5

    bf6068f9bdc676df304694e1c181334f

  • SHA1

    bb4da8a8a76714a63550496ba5dcc06eaec1162e

  • SHA256

    bae187a00945be87c8f627b2b6943360c67eec4cbf518d46790f6898f9f64e17

  • SHA512

    e4c614e71835e86c97928e9e1319d33f0a660dc1b70663d69d1d4eac77be4c1bfb9dfcb810e2540a3b1851052c6cf8f0080f84c96e5e924a8e7662792a5a676c

  • SSDEEP

    384:q3Mg/bqo2tLRx+BZpk6u+qIJar91C8uKFR+WweV:Qqo2nxeZpk6uJAar9puKF4eV

Malware Config

Extracted

Path

C:\Users\Admin\Documents\read_it.txt

Ransom Note
Wintz Ransomware Group & Partners | EST: 2016 >>> What happens? Your computers and servers are encrypted, private data was downloaded. We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data. >>> Data leak First of all we have downloaded the entirety of your machine; quite litteraly everything. Including cookies, passwords, all files & anything else of meaning. If you fail to pay the desired ransomware within the time period provided your information will be sold on the darknet. The data is preloaded and will be published if you do not contact us. >>> What guarantees? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. We always keep our promises. >> HOW TO CONTACT US? Please EMail: [email protected] >> Warning! Recovery recommendations. We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them.

Targets

    • Target

      2024-05-29_bf6068f9bdc676df304694e1c181334f_chaos_destroyer_wannacry

    • Size

      24KB

    • MD5

      bf6068f9bdc676df304694e1c181334f

    • SHA1

      bb4da8a8a76714a63550496ba5dcc06eaec1162e

    • SHA256

      bae187a00945be87c8f627b2b6943360c67eec4cbf518d46790f6898f9f64e17

    • SHA512

      e4c614e71835e86c97928e9e1319d33f0a660dc1b70663d69d1d4eac77be4c1bfb9dfcb810e2540a3b1851052c6cf8f0080f84c96e5e924a8e7662792a5a676c

    • SSDEEP

      384:q3Mg/bqo2tLRx+BZpk6u+qIJar91C8uKFR+WweV:Qqo2nxeZpk6uJAar9puKF4eV

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Detects command variations typically used by ransomware

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks