← Back to Pulse Feed
PULSE DETAIL
This is worm-like ransomware based on Petya.
-- The malware was deployed via the software update mechanism in a piece of Ukranian accounting software on the morning of Tuesday 27th June 2017.
-- The malware encrypts files and the boot record of hard disks, leaving behind a ransomware note.
-- It spreads within networks through PsExec and WMIC commands, using credentials stolen by a tool similiar to Mimikatz.
-- It also attempts to srpead using the EternalBlue and EternalRomance SMBv1 exploits.
-- It also clears event logs and the file system journals.
-- In this case paying the attackers will not help get any files back.
Example note:
Please follow the instructions:
1. Send $300 worth of Bitcoin to following address: 1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX
2. Send your Bitcoin wallet ID and personal installation key to e-mail wowsmith123456@posteo.net.
Indicators of Compromise (25)
References (7)
↗ https://twitter.com/JoKe_42/status/879693258183647232
↗ https://twitter.com/craiu/status/879689411419668480
↗ https://www.hybrid-analysis.com/sample/027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745?environmentId=100
↗ https://www.hybrid-analysis.com/sample/64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1?environmentId=100
↗ https://blog.comae.io/byata-enhanced-wannacry-a3ddd6c8dabb
↗ https://securelist.com/schroedingers-petya/78870/
↗ https://blogs.technet.microsoft.com/mmpc/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/