General

  • Target

    .packettracer

  • Size

    184B

  • Sample

    240925-j5xthaxfjb

  • MD5

    23e0d6741201dbc7f307b0d05373fae3

  • SHA1

    6666df2b250e7d39d969ba0b2ca37b899c05e952

  • SHA256

    ab7271c2dd8c3f1edc3ed8f7441cad0604558a5cfa4de0a0c8bd48918b8d6b82

  • SHA512

    24bb5ef1be466be1df1c8097bb60cc0ff48767188aa476d28e951f870b2252f8a91e5eb5ea31f267597581379ec7e2a288258fc847a5b794322b27fd7a423f7d

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\WannaCry-main\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Targets

    • Target

      .packettracer

    • Size

      184B

    • MD5

      23e0d6741201dbc7f307b0d05373fae3

    • SHA1

      6666df2b250e7d39d969ba0b2ca37b899c05e952

    • SHA256

      ab7271c2dd8c3f1edc3ed8f7441cad0604558a5cfa4de0a0c8bd48918b8d6b82

    • SHA512

      24bb5ef1be466be1df1c8097bb60cc0ff48767188aa476d28e951f870b2252f8a91e5eb5ea31f267597581379ec7e2a288258fc847a5b794322b27fd7a423f7d

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks