Resubmissions

14-10-2024 01:14

241014-blws4ayfmq 8

14-10-2024 01:08

241014-bhfygavaqf 10

14-10-2024 01:05

241014-bfjatavamh 3

14-10-2024 00:48

241014-a529jstgpe 3

14-10-2024 00:45

241014-a33gjatglc 3

General

  • Target

    main.go

  • Size

    5KB

  • Sample

    241014-bhfygavaqf

  • MD5

    3cc0d416c4ce3235ce06580ddcddcd22

  • SHA1

    6f63166d2fb6855149aa7bf16706ed9c6580b28a

  • SHA256

    deee2ea8dbf5abd5e3ed3bf22b9a06a0a1e3b127e24f0c7cf7177bf160e45a7e

  • SHA512

    0d1819acf9ad338db114930d99c69506a01388b5c2bed25217307671e45224427458f96b40d940f0fc91e62694e00201ac2f8e6f6d90d0ca6ba92dc81e98fe23

  • SSDEEP

    96:C58jbrWRqQk5f5ihdMhMO015lgVY/Wa8pgYWWp/Q:sSDihXDM8WO

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn

Targets

    • Target

      main.go

    • Size

      5KB

    • MD5

      3cc0d416c4ce3235ce06580ddcddcd22

    • SHA1

      6f63166d2fb6855149aa7bf16706ed9c6580b28a

    • SHA256

      deee2ea8dbf5abd5e3ed3bf22b9a06a0a1e3b127e24f0c7cf7177bf160e45a7e

    • SHA512

      0d1819acf9ad338db114930d99c69506a01388b5c2bed25217307671e45224427458f96b40d940f0fc91e62694e00201ac2f8e6f6d90d0ca6ba92dc81e98fe23

    • SSDEEP

      96:C58jbrWRqQk5f5ihdMhMO015lgVY/Wa8pgYWWp/Q:sSDihXDM8WO

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks