Resubmissions

11-08-2024 08:57

240811-kwnd5ssgrq 8

11-08-2024 08:53

240811-ktthdasgml 8

11-08-2024 08:47

240811-kp4sjssflj 10

11-08-2024 08:37

240811-kjelgawfla 8

11-08-2024 08:32

240811-ke9k2sscqm 10

11-08-2024 08:29

240811-kdnl7awdrb 6

11-08-2024 08:26

240811-kbzxfawdlc 6

General

  • Target

    MEMZ-Destructive.7z

  • Size

    17KB

  • Sample

    240811-ke9k2sscqm

  • MD5

    d91a65636b8d4b7437983e064e2580fa

  • SHA1

    2bfaf387d22b7e9c1a54c35d8ab33fa84006ece3

  • SHA256

    c547f9193b8fcb681dbb93968d54ac9912901097e1912ff7ad11c5a9ee13062c

  • SHA512

    0175a90f980354b6f9a0fb66be6672c18c03a33fb547a0a16d159f18745f59fc5f4d9dae69dfd4d3bcffbc1bd3bbc73901000931dc3c12b70dde6e4e72a92f9f

  • SSDEEP

    384:CxpNbARMGzvkdrUUAhybY4GfheFQb4M4ecf3iQ/FF87u20VoDWXeQT:Cxp6RLzMtUUVMsFQb4ycfiQ/o10XeQT

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Targets

    • Target

      MEMZ-Destructive.7z

    • Size

      17KB

    • MD5

      d91a65636b8d4b7437983e064e2580fa

    • SHA1

      2bfaf387d22b7e9c1a54c35d8ab33fa84006ece3

    • SHA256

      c547f9193b8fcb681dbb93968d54ac9912901097e1912ff7ad11c5a9ee13062c

    • SHA512

      0175a90f980354b6f9a0fb66be6672c18c03a33fb547a0a16d159f18745f59fc5f4d9dae69dfd4d3bcffbc1bd3bbc73901000931dc3c12b70dde6e4e72a92f9f

    • SSDEEP

      384:CxpNbARMGzvkdrUUAhybY4GfheFQb4M4ecf3iQ/FF87u20VoDWXeQT:Cxp6RLzMtUUVMsFQb4ycfiQ/o10XeQT

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks