General
-
Target
__monero_chan_monero_drawn_by_freerun79__sample-c27ac21e4c771729d224f96a865a76e0.jpg
-
Size
306KB
-
Sample
240923-sr77razekk
-
MD5
b4c10bd4dd5d40369ac98bc68f9b3de6
-
SHA1
1af7ece19cf5a4e769393a12b7a58f8d0e77a465
-
SHA256
019bcd286332c9c6f6c1591a3199cbb535c941c942d1a41be848264792731f95
-
SHA512
f667ea52dda31c71853e7fdfde662cc1d5b393ac8ab0a6151405b23c8ed3235af77d9e20dbe8e8a39ce8831a4ff1708b8e98a556d3ac426d016dd5817cf2f04e
-
SSDEEP
6144:MdR+WYCz+sFopT//HqK/sjOKqXrQwZ3oAG8SsubPBztiNndSOiOf:MdRetXxJ0krpZ3RG8buDBwNnAi
Static task
static1
Behavioral task
behavioral1
Sample
__monero_chan_monero_drawn_by_freerun79__sample-c27ac21e4c771729d224f96a865a76e0.jpg
Resource
win11-20240802-en
Malware Config
Extracted
blackcat
-
enable_network_discovery
true
-
enable_self_propagation
true
-
enable_set_wallpaper
true
-
extension
cvz8n37
-
note_file_name
RECOVER-${EXTENSION}-FILES.txt
-
note_full_text
>> What happened? Important files on your network was ENCRYPTED and now they have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your network was DOWNLOADED. If you DON'T WANT your sensitive data to be PUBLISHED you have to act quickly. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Private financial information including: clients data, bills, budgets, annual reports, bank statements. - Manufacturing documents including: datagrams, schemas, drawings in solidworks format - And more... >> CAUTION DO NOT MODIFY ENCRYPTED FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. >> What should I do next? 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://gbxbwicx3x35kn7n73opnpp4kkzjcra42iv2akoo2dcjinf6jf6qbuyd.onion/?access-key=${ACCESS_KEY}
Extracted
C:\Users\Admin\Downloads\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Extracted
C:\Users\Admin\Downloads\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Targets
-
-
Target
__monero_chan_monero_drawn_by_freerun79__sample-c27ac21e4c771729d224f96a865a76e0.jpg
-
Size
306KB
-
MD5
b4c10bd4dd5d40369ac98bc68f9b3de6
-
SHA1
1af7ece19cf5a4e769393a12b7a58f8d0e77a465
-
SHA256
019bcd286332c9c6f6c1591a3199cbb535c941c942d1a41be848264792731f95
-
SHA512
f667ea52dda31c71853e7fdfde662cc1d5b393ac8ab0a6151405b23c8ed3235af77d9e20dbe8e8a39ce8831a4ff1708b8e98a556d3ac426d016dd5817cf2f04e
-
SSDEEP
6144:MdR+WYCz+sFopT//HqK/sjOKqXrQwZ3oAG8SsubPBztiNndSOiOf:MdRetXxJ0krpZ3RG8buDBwNnAi
-
Modifies visibility of file extensions in Explorer
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
5Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1