General
-
Target
2025-02-16_6a5d6de74af2307b9ddb8e7e0a05aec3_wannacry
-
Size
130KB
-
Sample
250216-3p4rnasrdt
-
MD5
6a5d6de74af2307b9ddb8e7e0a05aec3
-
SHA1
a9bb545b11c8b4415359fead7a92ea848f508530
-
SHA256
4e44d16e3c4274d3a49d8562299659b7177632e484ca7ba3c0d7a95bc44d686a
-
SHA512
bffc0eed72576ac2b0d68410db02d76369bd937d9a4767cc0edd021343cf8f0a81af9813cb0038726ff61ac274f81ae4144f3717148807ba5973b7103408f8f2
-
SSDEEP
768:w7zxAmCgnegjDho9Ws82FOfMCwRhOF15utoS:wNCRADq9W3cS/wCFLS
Behavioral task
behavioral1
Sample
2025-02-16_6a5d6de74af2307b9ddb8e7e0a05aec3_wannacry.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-02-16_6a5d6de74af2307b9ddb8e7e0a05aec3_wannacry.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\read_it.txt
Targets
-
-
Target
2025-02-16_6a5d6de74af2307b9ddb8e7e0a05aec3_wannacry
-
Size
130KB
-
MD5
6a5d6de74af2307b9ddb8e7e0a05aec3
-
SHA1
a9bb545b11c8b4415359fead7a92ea848f508530
-
SHA256
4e44d16e3c4274d3a49d8562299659b7177632e484ca7ba3c0d7a95bc44d686a
-
SHA512
bffc0eed72576ac2b0d68410db02d76369bd937d9a4767cc0edd021343cf8f0a81af9813cb0038726ff61ac274f81ae4144f3717148807ba5973b7103408f8f2
-
SSDEEP
768:w7zxAmCgnegjDho9Ws82FOfMCwRhOF15utoS:wNCRADq9W3cS/wCFLS
-
Chaos Ransomware
-
Chaos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1