Resubmissions

04-08-2024 11:35

240804-nqcl8sycrd 10

General

  • Target

    XClient.exe

  • Size

    61KB

  • Sample

    240804-nqcl8sycrd

  • MD5

    d32248d4b7834bbe4310a9bac11968ee

  • SHA1

    b4d455bcb0c49520cfaae79321ebd2e50bd60ec6

  • SHA256

    13e0f289871d5fdb46d212725c9b13d3ab9c5012480c7cf4dd3a6708f0c3c908

  • SHA512

    70d15f6c89705484523a68267fe9765a15c437f4384ddbfa922b8a52f82e94cb53673c415f68bb42df76d3326b95dbfa4b407a1913bb9cec536ebbb6863c5f50

  • SSDEEP

    1536:zhlXi9DkMS27xQz1AOmfkbWzOhcRsUXjIOJHujn:zLy6MDu1xmkbWaalcOJH0

Malware Config

Extracted

Family

xworm

C2

tree-cleaning.gl.at.ply.gg:33027

hard-tyler.gl.at.ply.gg:27490

Attributes
  • install_file

    USB.exe

Extracted

Path

C:\Users\Admin\AppData\Roaming\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Extracted

Path

C:\g1rFryAhrVg2xrt\README_HOW_TO_UNLOCK.TXT

Ransom Note
YOUR FILE HAS BEEN LOCKED In order to unlock your files, follow the instructions bellow: 1. Download and install Tor Browser 2. After a successful installation, run Tor Browser and wait for its initialization. 3. Type in the address bar: http://zvnvp2rhe3ljwf2m.onion 4. Follow the instructions on the site.
URLs

http://zvnvp2rhe3ljwf2m.onion

Extracted

Path

C:\Users\Admin\AppData\Roaming\!Please Read Me!.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1 Next, please find the decrypt software on your desktop, an executable file named "!WannaDecryptor!.exe". If it does not exsit, download the software from the address below. (You may need to disable your antivirus for a while.) rar password: wcry123 Run and follow the instructions! �
Wallets

15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1

Targets

    • Target

      XClient.exe

    • Size

      61KB

    • MD5

      d32248d4b7834bbe4310a9bac11968ee

    • SHA1

      b4d455bcb0c49520cfaae79321ebd2e50bd60ec6

    • SHA256

      13e0f289871d5fdb46d212725c9b13d3ab9c5012480c7cf4dd3a6708f0c3c908

    • SHA512

      70d15f6c89705484523a68267fe9765a15c437f4384ddbfa922b8a52f82e94cb53673c415f68bb42df76d3326b95dbfa4b407a1913bb9cec536ebbb6863c5f50

    • SSDEEP

      1536:zhlXi9DkMS27xQz1AOmfkbWzOhcRsUXjIOJHujn:zLy6MDu1xmkbWaalcOJH0

    • Detect Xworm Payload

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Windows Firewall

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks