- CVE ID: CVE-2018-6651
- Vulnerable versions: <= 140-1
- Patched versions: >= 140-3
- Application: Parsec
- Vendor: Parsec Gaming
- Discovered by Paul Buonopane on 2018-01-16
- Reported on 2018-01-16
- Patched on 2018-01-16
- CVE requested on 2018-02-05
- Proof-of-Concept: https://parsecgaming.com.zenexer.com/
- Virus Name: WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY
- Vector: All Windows versions before Windows 10 are vulnerable if not patched for MS-17-010. It uses EternalBlue MS17-010 to propagate.
- Ransom: between $300 to $600. There is code to 'rm' (delete) files in the virus. Seems to reset if the virus crashes.
- Backdooring: The worm loops through every RDP session on a system to run the ransomware as that user. It also installs the DOUBLEPULSAR backdoor. It corrupts shadow volumes to make recovery harder. (source: malwarebytes)
- Kill switch: If the website
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
is up the virus exits instead of infecting the host. (source: malwarebytes). This domain has been sinkholed, stopping the spread of the worm. Will not work if proxied (source).
update: A minor variant of the viru
- To disable a service, download
Disable<Service>.reg
and double-click to import. (Replace<Service>
with the name of the service you want to disable.) - To re-enable a service, download
Enable<Service>.reg
and double-click to import. (Replace<Service>
with the name of the service you want to enable.)
Note that if you save the files by copying them into a text editor, they may need to be saved with Windows-style line endings (\r\n
).