General

  • Target

    CHEATBLOXFRUIT.exe

  • Size

    68KB

  • Sample

    240621-lsztfayfnk

  • MD5

    041b235f33b97454664759841a374573

  • SHA1

    1a05fc8c1f449566d3e30972fd9aaabc03dbc9d1

  • SHA256

    ab7e274e5bb0eaf7d46c8e3bce83c13a2e0c5a170c463c16c074a428ff562d12

  • SHA512

    36a8a6f41fbb74c63f4834c1d437a7a866da17645984671bd58194e6496113903888cd110b5608874801a133469707e14a3c0de356b380b086639befa8ae7a3b

  • SSDEEP

    1536:zJXF29ReOjinvSXVVFDyYJf9z6mkcdrpeO+uZgGk8:9XF29ReOjqGVljz6mkcdrpsm

Malware Config

Extracted

Family

xworm

Version

3.0

C2

et-hansen.gl.at.ply.gg:33635

Mutex

prtv1Q5500cT7S76

Attributes
  • Install_directory

    %AppData%

aes.plain

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Targets

    • Target

      CHEATBLOXFRUIT.exe

    • Size

      68KB

    • MD5

      041b235f33b97454664759841a374573

    • SHA1

      1a05fc8c1f449566d3e30972fd9aaabc03dbc9d1

    • SHA256

      ab7e274e5bb0eaf7d46c8e3bce83c13a2e0c5a170c463c16c074a428ff562d12

    • SHA512

      36a8a6f41fbb74c63f4834c1d437a7a866da17645984671bd58194e6496113903888cd110b5608874801a133469707e14a3c0de356b380b086639befa8ae7a3b

    • SSDEEP

      1536:zJXF29ReOjinvSXVVFDyYJf9z6mkcdrpeO+uZgGk8:9XF29ReOjqGVljz6mkcdrpsm

    • Detect Xworm Payload

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks