General
-
Target
rufus-4.6p.exe
-
Size
1.5MB
-
Sample
241111-rth5zatlhl
-
MD5
8fe64da09af371b02a31828415ece8f3
-
SHA1
5b5c90dcd425c814b555a4567405601aa977ee0b
-
SHA256
8279696c1d78b14618500e9135886a3667b9decc65946f3729002e4bfdbb20ab
-
SHA512
e49f9b1c9d33364101ad2fd4f2c5ed030700cc941bb469cf2ce7d5b32c51cab9e62b265e05cbd92435453e7e4008c9990bea532298676f7d81e5d6dcdc2f590b
-
SSDEEP
24576:H8U9+A6KdMt7ZRuYfuv9dTWGNj0GvXFGfkRssBUEt3kRQrf7zSIBDICweAVdEY2Y:cUUvltf6SGd/FGfIsTE665h0dEY2nY
Behavioral task
behavioral1
Sample
rufus-4.6p.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
C:\Users\Admin\Downloads\r.wnry
wannacry
Targets
-
-
Target
rufus-4.6p.exe
-
Size
1.5MB
-
MD5
8fe64da09af371b02a31828415ece8f3
-
SHA1
5b5c90dcd425c814b555a4567405601aa977ee0b
-
SHA256
8279696c1d78b14618500e9135886a3667b9decc65946f3729002e4bfdbb20ab
-
SHA512
e49f9b1c9d33364101ad2fd4f2c5ed030700cc941bb469cf2ce7d5b32c51cab9e62b265e05cbd92435453e7e4008c9990bea532298676f7d81e5d6dcdc2f590b
-
SSDEEP
24576:H8U9+A6KdMt7ZRuYfuv9dTWGNj0GvXFGfkRssBUEt3kRQrf7zSIBDICweAVdEY2Y:cUUvltf6SGd/FGfIsTE665h0dEY2nY
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
A potential corporate email address has been identified in the URL: [email protected]
-
Drops startup file
-
Modifies file permissions
-
Adds Run key to start application
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
YARA rule for Mozi IoT Botnet
Mozi IoT Botnet detection.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1