General

  • Target

    master

  • Size

    331KB

  • Sample

    240814-sxe36azdle

  • MD5

    56e237b2a1dd68df3fc2bde6ac7b258c

  • SHA1

    a6b9b597c2182c4afd10627d5cc548eb79ad9259

  • SHA256

    537cb83cf6e1535bc94731a404ea1f55c06ca0eba3c2adcf8b5817837ac7a420

  • SHA512

    3f6d7950e74e6148f9cb1f74ffe22f51f5c65faf9caf7ab4c2a430e3327de3e13763fe504715d9abfc695f51e62b6c39c64bf8e4cc4e131e03d3786ada0a06a4

  • SSDEEP

    6144:ZBora3uokeOvHS1d1+sNs8wbiWQr94vZJT3CqbMrhryf65NRPaCieMjAkvCJv1Vy:bora3uokeOvHS1d1+sNs8wbiWQr94vZV

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Targets

    • Target

      master

    • Size

      331KB

    • MD5

      56e237b2a1dd68df3fc2bde6ac7b258c

    • SHA1

      a6b9b597c2182c4afd10627d5cc548eb79ad9259

    • SHA256

      537cb83cf6e1535bc94731a404ea1f55c06ca0eba3c2adcf8b5817837ac7a420

    • SHA512

      3f6d7950e74e6148f9cb1f74ffe22f51f5c65faf9caf7ab4c2a430e3327de3e13763fe504715d9abfc695f51e62b6c39c64bf8e4cc4e131e03d3786ada0a06a4

    • SSDEEP

      6144:ZBora3uokeOvHS1d1+sNs8wbiWQr94vZJT3CqbMrhryf65NRPaCieMjAkvCJv1Vy:bora3uokeOvHS1d1+sNs8wbiWQr94vZV

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks