For an updated summary, see: WannaCry/WannaCrypt Ransomware Summary For a few hours, bad news are spreading quickly about a massive wave of infections by a new ransomware called "WannaCry". We are still trying to collect more information about it. It seems that 45K attacks were detected from 74 differents countries: Big targets have been telecom operators (ex: Telefonica in Spain) and hospitals in UK. Once the malware has infected a computer, it spreads across the network looking for new victims using the SMB protocol. The ransomware uses the Microsoft vulnerability MS17-10[1]. (This vulnerability was used by ETERNALBLUE[2]) Here are some IOC's that we already collected: SHA256:
SHA1:
MD5:
File extension: .wncry Ransomware notification: @Please_Read_Me@.txt Emerging threats has an IDS rule that catches the ransomware activity: (ID: 2024218) alert tcp $HOME_NET 445 -> any any (msg:"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response"; flow:from_server,established; content:"|00 00 00 31 ff|SMB|2b 00 00 00 00 98 07 c0|"; depth:16; fast_pattern; content:"|4a 6c 4a 6d 49 68 43 6c 42 73 72 00|"; distance:0; flowbits:isset,ETPRO.ETERNALBLUE; classtype:trojan-activity; sid:2024218; rev:2;) Until now, the best protection is of course to patch your systems as soon as possible and keep your users aware of the new ransomware campaign to preven them to open suspicious emails/files. [1] https://technet.microsoft.com/en-us/library/security/ms17-010.aspx We will update this diary with more information if available. Xavier Mertens (@xme) |
Xme 581 Posts ISC Handler May 15th 2017 |
Thread locked Subscribe |
May 15th 2017 3 years ago |
The ET rule includes this:
flowbits:isset,ETPRO.ETERNALBLUE; Do you have the other rule that sets the ETERNALBLUE flowbit? |
John 88 Posts |
Quote |
May 12th 2017 3 years ago |
That would be 2024220. I currently do not have access the actual content of the signature.
|
Anonymous |
Quote |
May 12th 2017 3 years ago |
alert smb any any -> $HOME_NET any (msg:"ET EXPLOIT Possible ETERNALBLUE MS17-010 Heap Spray"; flow:to_server,established; content:"|ff|SMB|33 00 00 00 00 18 07 c0 00 00 00 00 00 00 00 00 00 00 00 00 00|"; offset:4; depth:25; content:"|08 ff fe 00 08 41 00 09 00 00 00 10|"; within:12; fast_pattern; content:"|00 00 00 00 00 00 00 10|"; within:8; content:"|00 00 00 10|"; distance:4; within:4; pcre:"/^[a-zA-Z0-9+/]{1000,}/R"; threshold: type threshold, track by_src, count 12, seconds 1; classtype:trojan-activity; sid:2024217; rev:1;)
alert smb any any -> $HOME_NET any (msg:"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Request (set)"; flow:to_server,established; content:"|00 00 00 31 ff|SMB|2b 00 00 00 00 18 07 c0|"; depth:16; fast_pattern; content:"|4a 6c 4a 6d 49 68 43 6c 42 73 72 00|"; distance:0; flowbits:set,ETPRO.ETERNALBLUE; flowbits:noalert; classtype:trojan-activity; sid:2024220; rev:1;) alert smb $HOME_NET any -> any any (msg:"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response"; flow:from_server,established; content:"|00 00 00 31 ff|SMB|2b 00 00 00 00 98 07 c0|"; depth:16; fast_pattern; content:"|4a 6c 4a 6d 49 68 43 6c 42 73 72 00|"; distance:0; flowbits:isset,ETPRO.ETERNALBLUE; classtype:trojan-activity; sid:2024218; rev:1;) |
Xme 581 Posts ISC Handler |
Quote |
May 12th 2017 3 years ago |
Here are some IOCs that allegedly hit a telecom company
https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa?environmentId=100 |
Anonymous |
Quote |
May 13th 2017 3 years ago |
open the domain
Open this domain, www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com It is a killswitch for the worm. If the malware finds it, is shuts down. Malwarebytes figured it out and bought the name and setup the site. Expect a new variant yet this weekend, that bypasses this flaw. |
Anonymous |
Quote |
May 13th 2017 3 years ago |
Legacy (XP, etc.) systems patch is out: https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
|
daem0n647 6 Posts |
Quote |
May 13th 2017 3 years ago |
A killswitch has been activated stopping the spread of the virus....
https://www.theguardian.com/technology/2017/may/13/accidental-hero-finds-kill-switch-to-stop-spread-of-ransomware-cyber-attack?CMP=fb_gu |
Anonymous |
Quote |
May 13th 2017 3 years ago |
This Google search:
intitle:"Index of" "WNCRY" returns a couple of dozen systems, some that are displaying things like: 404.html.bak.WNCRY, 2017-03-18 23:19, 616. [TXT], @Please_Read_Me@.txt, 2017-05-12 22:52, 933. [ ], @WanaDecryptor@.exe, 2017-05-12 02:22, 240K. I haven't been brave enough to actually click any of the links, though... |
Anonymous |
Quote |
May 13th 2017 3 years ago |
Quote:Until now, the best protection is of course to patch your systems as soon as possible and keep your users aware of the new ransomware campaign to preven them to open suspicious emails/files. In addition to this: use Software Restriction Policies to stop the PRIMARY attack vector, i.e. deny execution of anything your users can write/create (unless installed into a safe directory where only an administrator can write). |
Anonymous |
Quote |
May 13th 2017 3 years ago |
WannaCrypt Emergency Patch for pre-Windows 10 computers targeted
http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598 (Microsoft) Customer Guidance for WannaCrypt attacks https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/ We are working with customers to provide additional assistance as this situation evolves, and will update this blog with details as appropriate. Phillip Misner, Principal Security Group Manager Microsoft Security Response Center Further resources: Download English language security updates: Windows Server 2003 SP2 x64, Windows Server 2003 SP2 x86, Windows XP SP2 x64,Windows XP SP3 x86, Windows XP Embedded SP3 x86, Windows 8 x86, Windows 8 x64 Download localized language security updates: Windows Server 2003 SP2 x64, Windows Server 2003 SP2 x86, Windows XP SP2 x64,Windows XP SP3 x86, Windows XP Embedded SP3 x86, Windows 8 x86, Windows 8 x64 General information on ransomware: https://www.microsoft.com/en-us/security/portal/mmpc/shared/ransomware.aspx MS17-010 Security Update: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx MS17-010: Security update for Windows SMB Server: March 14, 2017 Including Windows 10 https://support.microsoft.com/en-us/help/4013389/title http://www.trymytools.com/how-to-remove-wannacryptor-ransomware-and-decrypt-files/ |
Anonymous |
Quote |
Jun 8th 2017 3 years ago |
Sign Up for Free or Log In to start participating in the conversation!