I have put together a little "petri dish" test environment and started looking for a sample that has the exploit. Some samples out there simply do not have the exploit code, and even tough they will encrypt the files locally, sometimes the mounted shares too, they would not spread.
Luckily, I have found this nice blog post from McAfee Labs: https://securingtomorrow.mcafee.com/mcafee-labs/analysis-wannacry-ransomware/ with the reference to the sample SHA256: 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c (they keep referring to samples with MD5, which is still a very-very bad practice, but the hash is MD5: DB349B97C37D22F5EA1D1841E3C89EB4)
Once I got the sample from the VxStream Sandbox site, dropped it in the test environment, and monitored it with Security Onion. I was super happy to see it spreading, despite the fact that for the first run my Windows 7 x64 VM went to BSOD as the EthernalBlue exploit failed.
But the second run was a full success, all my Windows 7 VMs got infected. Brad was so kind and made a guest blog post at one of my favorite sites, www.malware-traffic-analysis.net so you can find the pcap, description of the test environment and some screenshots here: http://malware-traffic-analysis.net/2017/05/18/index2.html
Read more
- Pentest Tools Nmap
- Pentest Tools For Windows
- Hacking Tools For Windows
- Hacking Tools Free Download
- Hacker Tools Apk
- Hacking Tools And Software
- Hacker Tools Hardware
- Hacking Tools For Beginners
- Underground Hacker Sites
- Hacker Tools Free
- Physical Pentest Tools
- Hacking Tools For Windows
- Pentest Tools Port Scanner
- Hacking Tools Download
- Nsa Hacker Tools
- Hack Tools For Windows
- Best Hacking Tools 2019
- Hacking Tools Mac
- Hacking Tools Free Download
- Best Hacking Tools 2020
- New Hacker Tools
- Hack Tools For Pc
- Hacking Tools Pc
- Nsa Hacker Tools
- Hack Tools
- Hacking Tools For Windows
- Pentest Tools Framework
- Top Pentest Tools
No comments:
Post a Comment
Note: only a member of this blog may post a comment.