This information is marked TLP White: Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction.
*Any reproduction or reposting of this content requires proper credit / attribution to H-ISAC.
Summary
This new ransomware attack was first observed on June 27, 2017. The impacted entities are mostly focused in the EU at this time but we do have reports of a US healthcare entity being impacted as well. Multiple sectors including financial, telecom, transportation, healthcare and energy have reported that their operations are impacted.
The initial infection vector is still unknown at this time.
There are public reports that Petya is using ETERNALBLUE/DOUBLEPULSAR for lateral movement, and that seems to be a part of it. We can’t confirm this yet (still looking for code or behavior that would indicate eternalblue).
There is a lateral movement component that performs the following:
Enumerate active connections using WNetOpenEnum (enumerate currently active connections)
Enumerate current users credentials using CredEnumerateW
Attempt to establish connection to enumerated machines using enumerated credentials using WNetAddConnection2
After the malware executes, it will establish a scheduled task to reboot the machine after 1 hour. This will allow it time to infect other victims on the network. Once the reboot occurs, a fake CHKDSK screen appears and encrypts the master file table and displays the ransom message.
Technical Indicators
Targeted extensions:
.3ds,.7z,.accdb,.ai,.asp,.aspx,.avhd,.back,.bak,.c,.cfg,.conf,.cpp,.cs,.
ctl,.dbf,.disk,.djvu,.doc,.docx,.dwg,.eml,.fdb,.gz,.h,.hdd,.kdbx,.mail,.
mdb,.msg,.nrg,.ora,.ost,.ova,.ovf,.pdf,.php,.pmf,.ppt,.pptx,.pst,.pvi,.
py,.pyc,.rar,.rtf,.sln,.sql,.tar,.vbox,.vbs,.vcb,.vdi,.vfd,.vmc,.vmdk,.
vmsd,.vmx,.vsdx,.vsv,.work,.xls,.xlsx,.xvd,.zip,.
IOCs:
027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745
Drops….
02ef73bd2458627ed7b397ec26ee2de2e92c71a0e7588f78734761d8edbdcd9f
Attacker Email:
Bitcoin Wallet:
1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX
https://blockchain.info/address/1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX
……………………………………………………………………………
Ransomware Note:
Ooops, your important files are encrypted. If you see this text, then
your files are no longer accessible, because they have been encrypted.
Perhaps you are busy looking for a way to recover your files, but don’t
waste your time. Nobody can recover your files without our decryption
service.
We guarantee that you can recover all your files safely and easily. All
you need to do is submit the payment and purchase the decryption key.
Please follow the instructions:
Send $300 worth of Bitcoin to following address:
1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX
Send your Bitcoin wallet ID and personal installation key to e-mail
wowsmith123456@posteo.net. Your personal installation key:
*************
If you already purchased your key, please enter it below/ Key:
…………………………………………………………………………………………………….
—
*Any reproduction or reposting of this content requires proper credit / attribution to H-ISAC.