Resubmissions

09-07-2024 23:29

240709-3gzgzasejn 10

09-07-2024 23:27

240709-3fsysssdmp 3

09-07-2024 14:14

240709-rj642sxfqk 10

General

  • Target

    fffddsfdsgfd.png

  • Size

    82KB

  • Sample

    240709-rj642sxfqk

  • MD5

    d586f6d0e6532c1e30c420f7167856bd

  • SHA1

    2b3cd081d870b29df1f6249f3f50d890321bb983

  • SHA256

    21df242a377d7ddea14251178bb29a2300c8535eac6bdde541f910f709472223

  • SHA512

    3f3dc9059bc45b0ff79ac586a8440a87879168ea5ba8f5d07279e99a072656a15ec6d4b7037dfdd3a1faafc087c982116085a902e057b064fef908098888bf5f

  • SSDEEP

    1536:hpk3C1qszuBnQbxe/xRgGbFBH4dCOPEtp7VpRKYlkUTZMdFsiHyfc0Nz196:A3ASBQbxsfg8Fh4dC4WpXRV1ZiSkS96

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:111

Mutex

25f7eeb75e53b74dd2777060376f78f3

Attributes
  • reg_key

    25f7eeb75e53b74dd2777060376f78f3

  • splitter

    |'|'|

Extracted

Family

njrat

Version

0.7d

Botnet

slave

C2

127.0.0.1:111

Mutex

7ed27061f4d1ca6d9a32b0e33d0d0084

Attributes
  • reg_key

    7ed27061f4d1ca6d9a32b0e33d0d0084

  • splitter

    Y262SUCZ4UJJ

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Targets

    • Target

      fffddsfdsgfd.png

    • Size

      82KB

    • MD5

      d586f6d0e6532c1e30c420f7167856bd

    • SHA1

      2b3cd081d870b29df1f6249f3f50d890321bb983

    • SHA256

      21df242a377d7ddea14251178bb29a2300c8535eac6bdde541f910f709472223

    • SHA512

      3f3dc9059bc45b0ff79ac586a8440a87879168ea5ba8f5d07279e99a072656a15ec6d4b7037dfdd3a1faafc087c982116085a902e057b064fef908098888bf5f

    • SSDEEP

      1536:hpk3C1qszuBnQbxe/xRgGbFBH4dCOPEtp7VpRKYlkUTZMdFsiHyfc0Nz196:A3ASBQbxsfg8Fh4dC4WpXRV1ZiSkS96

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks