Resubmissions

11-12-2024 18:38

241211-w98g1stpgx 10

20-10-2024 07:51

241020-jqcj1sxcjf 1

20-10-2024 04:12

241020-esnb3szhpk 1

General

  • Target

    smokes_sewers_5.txt

  • Size

    1KB

  • Sample

    241211-w98g1stpgx

  • MD5

    45956e8bb32007e05a2cdb32de1342d2

  • SHA1

    491b5caf57436f25d242d2755bfef8c66f590c51

  • SHA256

    2fef20b197e160969da400b4cb78e680f0504581e78dad123b555c6b190d0f3b

  • SHA512

    0a02910df2d3ab63f3f8b298410843eaba2fedb3f650465e00e294b09615247d16f34362f76fa545dd252f2c5f280072c082b3a5f14a257e6699435b24704116

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Targets

    • Target

      smokes_sewers_5.txt

    • Size

      1KB

    • MD5

      45956e8bb32007e05a2cdb32de1342d2

    • SHA1

      491b5caf57436f25d242d2755bfef8c66f590c51

    • SHA256

      2fef20b197e160969da400b4cb78e680f0504581e78dad123b555c6b190d0f3b

    • SHA512

      0a02910df2d3ab63f3f8b298410843eaba2fedb3f650465e00e294b09615247d16f34362f76fa545dd252f2c5f280072c082b3a5f14a257e6699435b24704116

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks