Resubmissions

14/04/2025, 14:30 UTC

250414-rt5nzaynz8 10

14/04/2025, 02:20 UTC

250414-cstgzsyxdy 10

12/04/2025, 17:10 UTC

250412-vp2nasyxav 10

12/04/2025, 02:16 UTC

250412-cp7kfavvfx 10

12/04/2025, 02:09 UTC

250412-clncdsvpt9 10

11/04/2025, 20:14 UTC

250411-y1cebsyxa1 10

11/04/2025, 20:13 UTC

250411-yzdwrsywhs 4

11/04/2025, 18:52 UTC

250411-xh5sgsxvf1 10

General

  • Target

    cooker.exe

  • Size

    16.9MB

  • Sample

    250412-cp7kfavvfx

  • MD5

    80db6fcf8a589124f620ec27b3b7fb7b

  • SHA1

    041e55bf6872fab5589f1262918cb2a3609a1838

  • SHA256

    0849b85e16da3b4fc89ec373fd9f42dc6cfa61f5592792bf48991f1e8d544d3a

  • SHA512

    86ed5a8be7b05d73101dd5d0e9ba1da49caf9ebc55ddcf3fb4a38fb7855169211403dfa00d27a180a7229b51692f3f1f7967b05e382d741a4146de5b637cf1c0

  • SSDEEP

    393216:fCnSigft7o+XsyZKHHRVs50bie1wnb4wCRYr7GNGu:fC+f5zcTHxVpbiCsAs7g

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Roaming\@Please_Read_Me@.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@WanaDecryptor@.exe". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Targets

    • Target

      cooker.exe

    • Size

      16.9MB

    • MD5

      80db6fcf8a589124f620ec27b3b7fb7b

    • SHA1

      041e55bf6872fab5589f1262918cb2a3609a1838

    • SHA256

      0849b85e16da3b4fc89ec373fd9f42dc6cfa61f5592792bf48991f1e8d544d3a

    • SHA512

      86ed5a8be7b05d73101dd5d0e9ba1da49caf9ebc55ddcf3fb4a38fb7855169211403dfa00d27a180a7229b51692f3f1f7967b05e382d741a4146de5b637cf1c0

    • SSDEEP

      393216:fCnSigft7o+XsyZKHHRVs50bie1wnb4wCRYr7GNGu:fC+f5zcTHxVpbiCsAs7g

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Sets desktop wallpaper using registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.