General

  • Target

    2025-01-25_ea6329f56de3d950ec51147a51e7e4f5_destroyer_wannacry

  • Size

    23KB

  • Sample

    250125-yfb8tsxpct

  • MD5

    ea6329f56de3d950ec51147a51e7e4f5

  • SHA1

    ed291641efe32c980504a8f093f61d0c7a7e1c7c

  • SHA256

    5a55e691732dc0601f0db09e4e3a9ea5faace1a6497455e5f9223dc913c4f264

  • SHA512

    06bc1a910d08be17d9c14ce1d163d05c6f36a8ea8b9eeccb1f9f1ab9eacb68c3a833a1b68632f0b0cab8136b1b01fed960e1ff44e4e4c7727f0fdc1e6fc411cc

  • SSDEEP

    384:u3Mg/bqo2Q+tZR11pXrjsWyrVaJPr91CA4yQieY:Mqo23tZRTpXrjsPVePr9F4AeY

Malware Config

Extracted

Path

C:\Users\Admin\Documents\read_it.txt

Ransom Note
GARMIN Your files have been encrypted! All of your files are locked. We have used strong encryption to secure all of your data. To decrypt it, you need to pay a ransom. Contact us at: [email protected] for the price of your data. Important: Do not try to restore your files using backup systems or third-party tools, as this may lead to permanent data loss. You have 24hours to make the payment before your files are permanently deleted. If you contact law enforcement or attempt to bypass the process, we will delete your data immediately and without warning. We are the only ones who can restore your files.

Targets

    • Target

      2025-01-25_ea6329f56de3d950ec51147a51e7e4f5_destroyer_wannacry

    • Size

      23KB

    • MD5

      ea6329f56de3d950ec51147a51e7e4f5

    • SHA1

      ed291641efe32c980504a8f093f61d0c7a7e1c7c

    • SHA256

      5a55e691732dc0601f0db09e4e3a9ea5faace1a6497455e5f9223dc913c4f264

    • SHA512

      06bc1a910d08be17d9c14ce1d163d05c6f36a8ea8b9eeccb1f9f1ab9eacb68c3a833a1b68632f0b0cab8136b1b01fed960e1ff44e4e4c7727f0fdc1e6fc411cc

    • SSDEEP

      384:u3Mg/bqo2Q+tZR11pXrjsWyrVaJPr91CA4yQieY:Mqo23tZRTpXrjsPVePr9F4AeY

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Chaos family

    • Renames multiple (230) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks