Skip to main content Link Menu Expand (external link) Document Search Copy Copied
Category Details References
Actors    
First Observed May 2017 1
Threat Actors North Korea 2
Environment    
Platforms Windows 1
Artifacts    
Extensions .wannacry
.wcry
.Wnry
.wncry
3
4
5
Ransomware Notes info.hta 6
Services It Disables    
Other Observables Various YARA rules in existence 7
Automation    
Automatically Gains Access Yes, via EternalBlue SMB exploit 8
Automatically Escalates Privileges No.
Not needed because it encrypts only local files.
 
Requires Human Interaction No.
Encrypts and spreads automatically. But does install DoublePulsar backdoor that could later be used by a human.
9
10
Automatic Exfiltration No  
Automatic Propagation Yes.
Exploits other computers using EternalBlue.
11

Please note, this page was last updated at 2023-03-14 20:21.