General

  • Target

    OperaSetup.exe

  • Size

    2.0MB

  • Sample

    241130-v6f3xstqbr

  • MD5

    271269d8d69ef1e0eb683c8926f92215

  • SHA1

    7bf1a083b6fbf0ec9517668f0b2536cb89e8d102

  • SHA256

    6f200e8367eab016045a8295964728f115d49e8ba0f287b12a8092186aee2bf6

  • SHA512

    2309795e7f7a2f25fd5257870a840dad5d482c5e307a9f540829f931fdd84a2c9ae886fe59982deae48a5d849cc11e88e042f8b6f0ff6ba38db76802fbd9d7e1

  • SSDEEP

    49152:UVAbwuKbBgP4bW/rsMOgYf5yBVy96Ggari+0HxiQZv//:4Avqggqzsjz5i3++xiAvn

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Targets

    • Target

      OperaSetup.exe

    • Size

      2.0MB

    • MD5

      271269d8d69ef1e0eb683c8926f92215

    • SHA1

      7bf1a083b6fbf0ec9517668f0b2536cb89e8d102

    • SHA256

      6f200e8367eab016045a8295964728f115d49e8ba0f287b12a8092186aee2bf6

    • SHA512

      2309795e7f7a2f25fd5257870a840dad5d482c5e307a9f540829f931fdd84a2c9ae886fe59982deae48a5d849cc11e88e042f8b6f0ff6ba38db76802fbd9d7e1

    • SSDEEP

      49152:UVAbwuKbBgP4bW/rsMOgYf5yBVy96Ggari+0HxiQZv//:4Avqggqzsjz5i3++xiAvn

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks