Resubmissions

07-10-2024 19:03

241007-xqldtavhra 6

27-09-2024 23:46

240927-3samzsybkf 8

27-09-2024 23:14

240927-28aggsxbnh 10

27-09-2024 23:12

240927-26vpmsvbjk 8

27-09-2024 20:13

240927-yzes3axdnk 8

27-09-2024 20:12

240927-yy349sxdmm 3

27-09-2024 20:10

240927-yxq4bazcma 3

27-09-2024 20:02

240927-yr5drazaqf 8

27-09-2024 19:59

240927-yqh45axamm 3

27-09-2024 19:56

240927-ynwx7swhll 3

General

  • Target

    Screenshot 2024-09-24 2.11.17 PM.png

  • Size

    45KB

  • Sample

    240927-28aggsxbnh

  • MD5

    578c76503d19e73f7a935cdfb1a4108e

  • SHA1

    74644b49ebeb844cfa821fe70251f8e56ac6e112

  • SHA256

    3e5e23c0adf484b96a726f9ecdbd4a3089ad7f8979329616b73e521825e183ae

  • SHA512

    52b1cb29234be0e46a90cc26f8ac9ad6ff45887f80fbaf20da53bce7c9530111778317aaa393e6e94fe97f3f15372a0de869f709e768f278bd74ba989599ca0d

  • SSDEEP

    768:54PXdrAREaTeqsZ+93ArVC7UpbJss0JAKEKFXsojUIFI5A29+FKn2g5Fh2O:54Pa1swmfNIOKEKSY29tnxhz

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\!Please Read Me!.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1 Next, please find the decrypt software on your desktop, an executable file named "!WannaDecryptor!.exe". If it does not exsit, download the software from the address below. (You may need to disable your antivirus for a while.) rar password: wcry123 Run and follow the instructions! �
Wallets

15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1

Targets

    • Target

      Screenshot 2024-09-24 2.11.17 PM.png

    • Size

      45KB

    • MD5

      578c76503d19e73f7a935cdfb1a4108e

    • SHA1

      74644b49ebeb844cfa821fe70251f8e56ac6e112

    • SHA256

      3e5e23c0adf484b96a726f9ecdbd4a3089ad7f8979329616b73e521825e183ae

    • SHA512

      52b1cb29234be0e46a90cc26f8ac9ad6ff45887f80fbaf20da53bce7c9530111778317aaa393e6e94fe97f3f15372a0de869f709e768f278bd74ba989599ca0d

    • SSDEEP

      768:54PXdrAREaTeqsZ+93ArVC7UpbJss0JAKEKFXsojUIFI5A29+FKn2g5Fh2O:54Pa1swmfNIOKEKSY29tnxhz

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks