Resubmissions

19-01-2025 10:59

250119-m3gw2svjcw 10

19-01-2025 10:48

250119-mv98matqgv 8

General

  • Target

    6617-rocketleague-ssl.png

  • Size

    39KB

  • Sample

    250119-m3gw2svjcw

  • MD5

    a27e3788dd7e0171d8a8c8ec93fc962f

  • SHA1

    57c1d8e31e629a935e7060964acbe8ad788adc52

  • SHA256

    7c99df3fbb34e518ff75467ac763091af86e084ee3f4eae922344fe876a56d30

  • SHA512

    4cdf6346f7d2c49f7b68d8ac9e2ff45f946d14df84007a8eb95d561bbf2b9275458a3fec797c8b275b83ed7369f4c6f807bfc2069cf44f36a76db8bd698020f5

  • SSDEEP

    768:OwntOuOYffE0KpBuQktxnH0ZbjcrqgclyYnvZpkHzj0TfcbV6LjZOCJ0RSovUYQx:FnAuY0KDqtxnH6booyYnx+TA66f70RSt

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Targets

    • Target

      6617-rocketleague-ssl.png

    • Size

      39KB

    • MD5

      a27e3788dd7e0171d8a8c8ec93fc962f

    • SHA1

      57c1d8e31e629a935e7060964acbe8ad788adc52

    • SHA256

      7c99df3fbb34e518ff75467ac763091af86e084ee3f4eae922344fe876a56d30

    • SHA512

      4cdf6346f7d2c49f7b68d8ac9e2ff45f946d14df84007a8eb95d561bbf2b9275458a3fec797c8b275b83ed7369f4c6f807bfc2069cf44f36a76db8bd698020f5

    • SSDEEP

      768:OwntOuOYffE0KpBuQktxnH0ZbjcrqgclyYnvZpkHzj0TfcbV6LjZOCJ0RSovUYQx:FnAuY0KDqtxnH6booyYnx+TA66f70RSt

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks