General

  • Target

    55504677f82981962d85495231695d3a92aa0b31ec35a957bd9cbbef618658e3

  • Size

    5.0MB

  • Sample

    220201-he4npaacan

  • MD5

    30fe2f9a048d7a734c8d9233f64810ba

  • SHA1

    2027a053de21bd5c783c3f823ed1d36966780ed4

  • SHA256

    55504677f82981962d85495231695d3a92aa0b31ec35a957bd9cbbef618658e3

  • SHA512

    b657b02506f768db3255293b0c86452b4dfdd30804629c323aaa9510a3b637b0906e5963179ef7d4aaedc14646f2be2b4292e6584a6c55c6ddb596cff7f20e2a

Malware Config

Targets

    • Target

      55504677f82981962d85495231695d3a92aa0b31ec35a957bd9cbbef618658e3

    • Size

      5.0MB

    • MD5

      30fe2f9a048d7a734c8d9233f64810ba

    • SHA1

      2027a053de21bd5c783c3f823ed1d36966780ed4

    • SHA256

      55504677f82981962d85495231695d3a92aa0b31ec35a957bd9cbbef618658e3

    • SHA512

      b657b02506f768db3255293b0c86452b4dfdd30804629c323aaa9510a3b637b0906e5963179ef7d4aaedc14646f2be2b4292e6584a6c55c6ddb596cff7f20e2a

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

      suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

      suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    • Executes dropped EXE

    • Sets service image path in registry

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks