Feel free to discuss any topics relating to cybersecurity with the rest of the security community in this forum.
WannaCry Ransomware Code
- o_icemanssl22
-
Topic Author
- Offline
- Premium Member
-
- Posts: 142
- Thank you received: 0
WannaCry campaign is gaining access to enterprise servers either through Remote Desktop Protocol or through the exploitation of a critical Windows SMB vulnerability
*****************************************
rule Wanna_Cry_Ransomware_Generic {
meta:
description = "Detects WannaCry Ransomware on disk and in virtual page"
author = "US-CERT Code Analysis Team"
reference = "not set"
date = "2017/05/12"
hash0 = "4DA1F312A214C07143ABEEAFB695D904"
strings:
$s0 = {410044004D0049004E0024}
$s1 = "WannaDecryptor"
$s2 = "WANNACRY"
$s3 = "Microsoft Enhanced RSA and AES Cryptographic"
$s4 = "PKS"
$s5 = "StartTask"
$s6 = "wcry@123"
$s7 = {2F6600002F72}
$s8 = "unzip 0.15 Copyrigh"
condition:
$s0 and $s1 and $s2 and $s3 or $s4 or $s5 or $s6 or $s7 or $s8
}
/*The following Yara ruleset is under the GNU-GPLv2 license (
www.gnu.org/licenses/gpl-2.0.html
) and open to any user or organization, as long as you use it under this license.
rule MS17_010_WanaCry_worm {
meta:
description = "Worm exploiting MS17-010 and dropping WannaCry Ransomware"
author = "Felipe Molina (@felmoltor)"
reference = "
www.exploit-db.com/exploits/41987/
"
date = "2017/05/12"
strings:
$ms17010_str1="PC NETWORK PROGRAM 1.0"
$ms17010_str2="LANMAN1.0"
$ms17010_str3="Windows for Workgroups 3.1a"
$ms17010_str4="__TREEID__PLACEHOLDER__"
$ms17010_str5="__USERID__PLACEHOLDER__"
$wannacry_payload_substr1 = "h6agLCqPqVyXi2VSQ8O6Yb9ijBX54j"
$wannacry_payload_substr2 = "h54WfF9cGigWFEx92bzmOd0UOaZlM"
$wannacry_payload_substr3 = "tpGFEoLOU6 5I78Toh/nHs/RAP"
condition:
all of them
}
*****************************************
Apply the Microsoft patch for the MS17-010 SMB vulnerability dated March 14, 2017.
Please Log in or Create an account to join the conversation.