General

  • Target

    2025-02-02_3a6dcb521541f45851833615856452e1_wannacry

  • Size

    195KB

  • Sample

    250202-ezg4msxjaj

  • MD5

    3a6dcb521541f45851833615856452e1

  • SHA1

    43e7ae516237531c22cd69b7ca37a0ff39e9488e

  • SHA256

    f6dfe2824f24d1daad9d072df9e74f667510f1c22f98b887357010d0fded3a6c

  • SHA512

    e6a43be34cb421843b9ac31b2b5f21d2d2f96e16810de93dd0fa189a7bb4333bae5ffb94e5929b2a409b51147a4c2d9511814fd2af8186c88ce5a77eff700430

  • SSDEEP

    3072:woRNeWr98RskBc93hxfkB+7kjCGX8q1qz2/HuHZZ57/Euv8RnNaO:rnr98RI8sAwxWHaEi

Malware Config

Extracted

Path

C:\Users\Admin\Documents\read_it.txt

Ransom Note
HA HA HA, Revenge of Heisenberg!!! All of your files have been encrypted Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help.What can I do to get my files back?You can buy our special decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.The price for the software is $500. Payment can be made in Bitcoin only. How do I pay, where do I get Bitcoin? Purchasing Bitcoin varies from country to country, you are best advised to do a quick google search yourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable: Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com Payment informationAmount: 0.1473766 BTC Bitcoin Address: bc1qlnzcep4l4ac0ttdrq7awxev9ehu465f2vpt9aa

Targets

    • Target

      2025-02-02_3a6dcb521541f45851833615856452e1_wannacry

    • Size

      195KB

    • MD5

      3a6dcb521541f45851833615856452e1

    • SHA1

      43e7ae516237531c22cd69b7ca37a0ff39e9488e

    • SHA256

      f6dfe2824f24d1daad9d072df9e74f667510f1c22f98b887357010d0fded3a6c

    • SHA512

      e6a43be34cb421843b9ac31b2b5f21d2d2f96e16810de93dd0fa189a7bb4333bae5ffb94e5929b2a409b51147a4c2d9511814fd2af8186c88ce5a77eff700430

    • SSDEEP

      3072:woRNeWr98RskBc93hxfkB+7kjCGX8q1qz2/HuHZZ57/Euv8RnNaO:rnr98RI8sAwxWHaEi

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Chaos family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks