General
-
Target
Ransomware-Samples
-
Size
302KB
-
Sample
240629-bdqbcazfkp
-
MD5
a54a507481a648f0340b3b265bd5d276
-
SHA1
5563529dd1fc334034f49b42416e921ef54fbe1a
-
SHA256
9be562c3f2a211575f7871250c15fe9e7c9bd5789845c709f54eed4f3fec6925
-
SHA512
348fde450e45dcae8fb6c6785ca9c5f11ffa1fdde7d04a4aee9e6f993e6bb2fc24c987f66f28cd700a96d5051863d57042a7b42413ea27363f19fdf9312f91cd
-
SSDEEP
6144:njMoQh2n9dH5M2vkm0y3Cl3pId9Rn9VvZJT3CqbMrhryfQNRPaCieMjAkvCJv1VB:jMoQh2n9dH5M2vkm0y3Cl3pId9Rn9VvS
Static task
static1
Behavioral task
behavioral1
Sample
Ransomware-Samples
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Ransomware-Samples
Resource
win10v2004-20240611-en
Malware Config
Extracted
C:\Users\Admin\Desktop\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
Ransomware-Samples
-
Size
302KB
-
MD5
a54a507481a648f0340b3b265bd5d276
-
SHA1
5563529dd1fc334034f49b42416e921ef54fbe1a
-
SHA256
9be562c3f2a211575f7871250c15fe9e7c9bd5789845c709f54eed4f3fec6925
-
SHA512
348fde450e45dcae8fb6c6785ca9c5f11ffa1fdde7d04a4aee9e6f993e6bb2fc24c987f66f28cd700a96d5051863d57042a7b42413ea27363f19fdf9312f91cd
-
SSDEEP
6144:njMoQh2n9dH5M2vkm0y3Cl3pId9Rn9VvZJT3CqbMrhryfQNRPaCieMjAkvCJv1VB:jMoQh2n9dH5M2vkm0y3Cl3pId9Rn9VvS
-
Drops startup file
-
Executes dropped EXE
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1