Resubmissions

14-08-2024 00:49

240814-a6vk4ashrb 10

14-08-2024 00:42

240814-a2f7xasgqc 10

13-08-2024 22:37

240813-2j8yravcmn 10

General

  • Target

    95062f159bddce1c47bd708d8d244370_JaffaCakes118

  • Size

    149KB

  • Sample

    240814-a2f7xasgqc

  • MD5

    95062f159bddce1c47bd708d8d244370

  • SHA1

    4f1742f0f5cc4e19ded0654080ee0b8931c98c69

  • SHA256

    35091e1314cf0ce5b7fc7c4d5f8e62bae5de7054b8f635026cafd4cee3a5912e

  • SHA512

    b7855c6491aeb5476de2c63f7474016b358f514aed0423140e9b7c85dd44f8559040bf3f0d50b0a961310d6eab7d81d00454941ce94c3a84e01fde6615f4a879

  • SSDEEP

    3072:ufDd+s5q0Fy/3sU6OtX+9F1cYsyE5+FAdjI:uLng/H6w+L163NdU

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

128.92.203.42:80

37.187.161.206:8080

202.29.239.162:443

80.87.201.221:7080

190.188.245.242:80

12.163.208.58:80

213.197.182.158:8080

201.213.177.139:80

62.84.75.50:80

45.33.77.42:8080

185.183.16.47:80

78.249.119.122:80

177.129.17.170:443

51.15.7.189:80

152.169.22.67:80

119.106.216.84:80

109.169.12.78:80

51.15.7.145:80

219.92.13.25:80

190.117.79.209:80

rsa_pubkey.plain

Extracted

Path

C:\Users\Admin\Downloads\!Please Read Me!.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1 Next, please find the decrypt software on your desktop, an executable file named "!WannaDecryptor!.exe". If it does not exsit, download the software from the address below. (You may need to disable your antivirus for a while.) rar password: wcry123 Run and follow the instructions! �
Wallets

15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1

Targets

    • Target

      95062f159bddce1c47bd708d8d244370_JaffaCakes118

    • Size

      149KB

    • MD5

      95062f159bddce1c47bd708d8d244370

    • SHA1

      4f1742f0f5cc4e19ded0654080ee0b8931c98c69

    • SHA256

      35091e1314cf0ce5b7fc7c4d5f8e62bae5de7054b8f635026cafd4cee3a5912e

    • SHA512

      b7855c6491aeb5476de2c63f7474016b358f514aed0423140e9b7c85dd44f8559040bf3f0d50b0a961310d6eab7d81d00454941ce94c3a84e01fde6615f4a879

    • SSDEEP

      3072:ufDd+s5q0Fy/3sU6OtX+9F1cYsyE5+FAdjI:uLng/H6w+L163NdU

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Emotet payload

      Detects Emotet payload in memory.

    • Downloads MZ/PE file

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks