General

  • Target

    2024-09-06_8527e996e89d6e1e220158a211277428_wannacry_wapomi

  • Size

    3.4MB

  • Sample

    241102-t7zqzsyqdx

  • MD5

    8527e996e89d6e1e220158a211277428

  • SHA1

    39bf8abe621c655cc2e16bb3d2674c2941a9bd31

  • SHA256

    b75e07a2ca36745225ccc73183c0378e2e8458c9634567c1e3e6c3ae665ce91f

  • SHA512

    cb71275fe6858310f34deefc0d556bf66917e8fad4e59f6187152e16ef225aa79b8a8cbf9f15b42ec9ef26ed48ce62aad3b5b1babc3282aca6b5c7a3b1f08462

  • SSDEEP

    98304:XqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3:XqPe1Cxcxk3ZAEUadzR8yc4g

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Targets

    • Target

      2024-09-06_8527e996e89d6e1e220158a211277428_wannacry_wapomi

    • Size

      3.4MB

    • MD5

      8527e996e89d6e1e220158a211277428

    • SHA1

      39bf8abe621c655cc2e16bb3d2674c2941a9bd31

    • SHA256

      b75e07a2ca36745225ccc73183c0378e2e8458c9634567c1e3e6c3ae665ce91f

    • SHA512

      cb71275fe6858310f34deefc0d556bf66917e8fad4e59f6187152e16ef225aa79b8a8cbf9f15b42ec9ef26ed48ce62aad3b5b1babc3282aca6b5c7a3b1f08462

    • SSDEEP

      98304:XqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3:XqPe1Cxcxk3ZAEUadzR8yc4g

    • Bdaejec

      Bdaejec is a backdoor written in C++.

    • Bdaejec family

    • Detects Bdaejec Backdoor.

      Bdaejec is backdoor written in C++.

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks