General

  • Target

    beast-max

  • Size

    448KB

  • Sample

    250212-vrr7ms1kbv

  • MD5

    8d20478c03b5cf26443799e3e9175e78

  • SHA1

    e6050eecb1d7621f64cc991707801b9b33c09520

  • SHA256

    b0f9747074a79d49c856ee69096fae7032540c0835aa31d403bdc6c40c2ffaf7

  • SHA512

    d7b05e066a3a22fbaf1f1f967611d5f8743100b60739cb9de5d232c02a18239b7c52bb4a70e3edd152e1a0df70f0aa24b6b150a5eb04ae7fbdf6d40334931753

  • SSDEEP

    3072:tIHIfMzZyAJrtDh2h0Vgvz1QAisDUaeKk8F+VVVVVVVVVVVVVVVVSIQFbWyvcKop:2H2MzWfisDUTEbWocKocwO/j+cK

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\!Please Read Me!.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1 Next, please find the decrypt software on your desktop, an executable file named "!WannaDecryptor!.exe". If it does not exsit, download the software from the address below. (You may need to disable your antivirus for a while.) rar password: wcry123 Run and follow the instructions! �
Wallets

15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1

Targets

    • Target

      beast-max

    • Size

      448KB

    • MD5

      8d20478c03b5cf26443799e3e9175e78

    • SHA1

      e6050eecb1d7621f64cc991707801b9b33c09520

    • SHA256

      b0f9747074a79d49c856ee69096fae7032540c0835aa31d403bdc6c40c2ffaf7

    • SHA512

      d7b05e066a3a22fbaf1f1f967611d5f8743100b60739cb9de5d232c02a18239b7c52bb4a70e3edd152e1a0df70f0aa24b6b150a5eb04ae7fbdf6d40334931753

    • SSDEEP

      3072:tIHIfMzZyAJrtDh2h0Vgvz1QAisDUaeKk8F+VVVVVVVVVVVVVVVVSIQFbWyvcKop:2H2MzWfisDUTEbWocKocwO/j+cK

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Dharma family

    • InfinityLock Ransomware

      Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

    • Infinitylock family

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (678) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Deletes itself

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks