General

  • Target

    Idiot!.html

  • Size

    1KB

  • Sample

    250329-ytabds1nt4

  • MD5

    76b5f578abab7155e4f98e50c6ca24d2

  • SHA1

    76a3d945b025a5c5830020cd4b59c78c00458663

  • SHA256

    5e75e3136044b5ae53de976f2cb2f21c08e3fedf680c6f82cbbf05f5c29ccf29

  • SHA512

    70e1b6d6e2146792c1e3d67a36dbcf69e2d5ddd09519de2e3c66d132775e91c11d96b2ce22588b635f821882645cc5da0f87832c17d8b14cf10ffb0332dea514

Malware Config

Targets

    • Target

      Idiot!.html

    • Size

      1KB

    • MD5

      76b5f578abab7155e4f98e50c6ca24d2

    • SHA1

      76a3d945b025a5c5830020cd4b59c78c00458663

    • SHA256

      5e75e3136044b5ae53de976f2cb2f21c08e3fedf680c6f82cbbf05f5c29ccf29

    • SHA512

      70e1b6d6e2146792c1e3d67a36dbcf69e2d5ddd09519de2e3c66d132775e91c11d96b2ce22588b635f821882645cc5da0f87832c17d8b14cf10ffb0332dea514

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks