Resubmissions

03-08-2024 14:58

240803-scdplawhpk 10

General

  • Target

    IMG_7589.MP4

  • Size

    1.8MB

  • Sample

    240803-scdplawhpk

  • MD5

    d64859b2929a128ccc8969a9e3aa9d84

  • SHA1

    c43bab138d56260fb69fc24c0ef17e21fdb97555

  • SHA256

    73fae9bcbf2d9a6e7aa683f9b60d5504e4b02adbe9c015213ea4f13b0f031c64

  • SHA512

    761f2b7b9504c1dde92f1a44ac5c3ada93884252da556e414f78fda0558ebd0b3cffec40246635a81c70d67c64aac9a156a26800416c160679e6cd8a7b25b2ff

  • SSDEEP

    49152:z1+G07DTnPIVt6NjCAcsSfrsmpyvxcBYEscRwwv1QWnTO4apfQc:z1D0DTC69ysSzxyvKBYEXtvKWT5aJ

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\WannaCry-main\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn

Targets

    • Target

      IMG_7589.MP4

    • Size

      1.8MB

    • MD5

      d64859b2929a128ccc8969a9e3aa9d84

    • SHA1

      c43bab138d56260fb69fc24c0ef17e21fdb97555

    • SHA256

      73fae9bcbf2d9a6e7aa683f9b60d5504e4b02adbe9c015213ea4f13b0f031c64

    • SHA512

      761f2b7b9504c1dde92f1a44ac5c3ada93884252da556e414f78fda0558ebd0b3cffec40246635a81c70d67c64aac9a156a26800416c160679e6cd8a7b25b2ff

    • SSDEEP

      49152:z1+G07DTnPIVt6NjCAcsSfrsmpyvxcBYEscRwwv1QWnTO4apfQc:z1D0DTC69ysSzxyvKBYEXtvKWT5aJ

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks