Security News Wana Decrypt0r Ransomware Using NSA Exploit Leaked by Shadow Brokers Is on a Rampage

XhenEd

Level 28
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Mar 1, 2014
1,708

Hehehe... I was just looking for this because I had no chance to watch yesterday. Did you delete the video? I couldn't find the one you posted yesterday.

But then boom you just posted the video. So thanks! :D
 
  • Like
Reactions: frogboy

XhenEd

Level 28
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Mar 1, 2014
1,708
You already knew the end result... you just wanna watch a video for its "entertainment value."
Yeah, I already expected the result. I just wanted to know how AppGuard handles this ransomware. I expected the User Space block, which is a bit boring because it's just a block, no-frills, no thrills (/s) . :D

What I want to see now is how AppGuard operates if WannaCry is digitally signed. :D
 
5

509322

What I want to see now is how AppGuard operates if WannaCry is digitally signed. :D

If it executes, then it will encrypt files in User Space except those in Private Folders.

Guarded protections do not prevent file encryption.

You already know this...
 
  • Like
Reactions: XhenEd

XhenEd

Level 28
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Mar 1, 2014
1,708
If it executes, then it will encrypt files in User Space except those in Private Folders.

Guarded protections do not prevent file encryption.

You already know this...
Yes, I know. But I just want to know how exactly AppGuard operates with WannaCry running. I just want to know with my own eyes. :D
 
  • Like
Reactions: frogboy
5

509322

Yes, I know. But I just want to know how exactly AppGuard operates with WannaCry running. I just want to know with my own eyes. :D

Grab a WannaCry sample from Hybrid-Analysis.com and run it Guarded from the desktop...

Inside a VM of course.
 
  • Like
Reactions: XhenEd

XhenEd

Level 28
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Mar 1, 2014
1,708
Grab a WannaCry sample from Hybrid-Analysis.com and run it Guarded from the desktop...
hehehe.. I won't. :D

I'll just wait. Maybe someone will test when a WannaCry sample acquires a digital signature. :D

But if WannaCry never acquires a digital sig, then the better for all because it would be easier to detect and block. :D
 
  • Like
Reactions: frogboy
5

509322

hehehe.. I won't. :D

I'll just wait. Maybe someone will test when a WannaCry sample acquires a digital signature. :D

But if WannaCry never acquires a digital sig, then the better for all because it would be easier to detect and block. :D

Why would they even bother to sign WannaCry when they are already in the "chah-ching !"

Besides... most of you dedicated AppGuard users are running it in Locked Down mode, so it doesn't matter if WannaCry is ever digitally signed as it will be blocked whether it is signed or unsigned.
 

brambedkar59

Level 31
Verified
Top Poster
Well-known
Apr 16, 2017
2,097
"If the domain was not registered, the ransomware would start its encryption process, if it was registered, it would not encrypt any files. To protect victims, the researcher registered the domain, effectively preventing WannaCry from making new victims."
I don't understand how domain affects the working of Ransomware. Can anyone explain this in layman's terms?
 

DarkJoney

Level 2
Verified
Aug 6, 2014
82
"If the domain was not registered, the ransomware would start its encryption process, if it was registered, it would not encrypt any files. To protect victims, the researcher registered the domain, effectively preventing WannaCry from making new victims."
I don't understand how domain affects the working of Ransomware. Can anyone explain this in layman's terms?
It checks if the domain responds to the request.
If not - encrypts files.
If yes - doesn't start at all
 
  • Like
Reactions: brambedkar59

brambedkar59

Level 31
Verified
Top Poster
Well-known
Apr 16, 2017
2,097
It checks if the domain responds to the request.
If not - encrypts files.
If yes - doesn't start at all
Thanks for the reply.
Sorry, I am a noob but why it checks with the domain and why not just start encrypting the files on the PCs it gets activated?
Does it have to do with the decryption keys?
 

Arequire

Level 29
Verified
Top Poster
Content Creator
Feb 10, 2017
1,822
Thanks for the reply.
Sorry, I am a noob but why it checks with the domain and why not just start encrypting the files on the PCs it gets activated?
Does it have to do with the decryption keys?
As far as anyone can tell the domain was designed to be a killswitch. It would have afforded the author the ability to register the domain and stop the ransomware from continuing to encrypt files on systems that it spread to.
Since then another variant has been released with the domain killswitch removed.
 

brambedkar59

Level 31
Verified
Top Poster
Well-known
Apr 16, 2017
2,097
As far as anyone can tell the domain was designed to be a killswitch. It allowed the author the ability to stop the ransomware from continuing to encrypt files on systems that it spread to.
Since then another variant has been released with the domain killswitch removed.
Thanks for explaining that. I think I got it.
 

MBYX

Level 1
Verified
Jan 19, 2017
40
Is there a sample i can have a look at please?
Preferably kill switch removed version but happy for either. Can just pm me off the side.
 
  • Like
Reactions: MalwareTracker

Orion

Level 2
Verified
Apr 8, 2016
83
The only reason this malware is on a rampage because there are computers that are not patched for MS-17-010 even after the patch was released in march this year.

It wouldn't have been so deadly if it wasn't eternalblue being used.Yet again it stresses the importance of doing your windows updates.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top