General
-
Target
FM-AIO-2.5.0.0.exe
-
Size
9.2MB
-
Sample
250417-p6bwbaynz3
-
MD5
259686d48920b69f239b615c506c5ce0
-
SHA1
3e992a4642e1d412af875573689d9888f7d4f5e4
-
SHA256
e299a47ad46062cd9c93eda4b4fca56124ad6ffac2ce3f855506eee94588d1a0
-
SHA512
f0bc7be0d0806856bc9783737796358c12bd25a40231239fffeab06f077a4126405390345fd631eebb6e9ea5c158cff9604e40cdfc088402aa7ce8c7a5cdd41e
-
SSDEEP
49152:mnFIJkJb53asggM2bq7mTv+iru6gaDFHCUljX45t2gQlOgXyReN4DhNSwkm2XyPR:4Ng51+KsDlOxuUhNrUy89zP7XW/P1dF
Static task
static1
Behavioral task
behavioral1
Sample
FM-AIO-2.5.0.0.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
FM-AIO-2.5.0.0.exe
Resource
win11-20250410-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
FM-AIO-2.5.0.0.exe
-
Size
9.2MB
-
MD5
259686d48920b69f239b615c506c5ce0
-
SHA1
3e992a4642e1d412af875573689d9888f7d4f5e4
-
SHA256
e299a47ad46062cd9c93eda4b4fca56124ad6ffac2ce3f855506eee94588d1a0
-
SHA512
f0bc7be0d0806856bc9783737796358c12bd25a40231239fffeab06f077a4126405390345fd631eebb6e9ea5c158cff9604e40cdfc088402aa7ce8c7a5cdd41e
-
SSDEEP
49152:mnFIJkJb53asggM2bq7mTv+iru6gaDFHCUljX45t2gQlOgXyReN4DhNSwkm2XyPR:4Ng51+KsDlOxuUhNrUy89zP7XW/P1dF
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1