Resubmissions

14-11-2024 23:20

241114-3beklstrdt 7

14-11-2024 19:38

241114-ycv7jascrj 10

General

  • Target

    alkaline_trio___2_by_letsplaysuicide_d5l988-fullview.jpg

  • Size

    96KB

  • Sample

    241114-ycv7jascrj

  • MD5

    5a67b2ccd59a9026d7a65808e7fbe2b5

  • SHA1

    d98c2e6d0d7746a4b8cb974bf3137a4b7815c8f0

  • SHA256

    d0096ae477363291c2bd6307776c5674dfd0d6f718f0b99647f4d77d1f58117e

  • SHA512

    bf8337c3d0db282e666908a66aecdddadd3910c993bdbf6ebe824296952e6f6caab5f9785c4a37777a1b0b03789db7864f60c9a04e6ea89cabf25359c64a1f88

  • SSDEEP

    768:fNhjT3NZha5hyhai4CK/LZjtqjm4uHByznKM1++xW0+aE2OUb/scRuoxSa+EgQ:fzT3fha5hyhai4PLSy4p4gtHIEgQ

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\WannaCry-master\WannaCry-master\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Targets

    • Target

      alkaline_trio___2_by_letsplaysuicide_d5l988-fullview.jpg

    • Size

      96KB

    • MD5

      5a67b2ccd59a9026d7a65808e7fbe2b5

    • SHA1

      d98c2e6d0d7746a4b8cb974bf3137a4b7815c8f0

    • SHA256

      d0096ae477363291c2bd6307776c5674dfd0d6f718f0b99647f4d77d1f58117e

    • SHA512

      bf8337c3d0db282e666908a66aecdddadd3910c993bdbf6ebe824296952e6f6caab5f9785c4a37777a1b0b03789db7864f60c9a04e6ea89cabf25359c64a1f88

    • SSDEEP

      768:fNhjT3NZha5hyhai4CK/LZjtqjm4uHByznKM1++xW0+aE2OUb/scRuoxSa+EgQ:fzT3fha5hyhai4PLSy4p4gtHIEgQ

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks