General

  • Target

    0183fb721c38a1556692720a9238411d96946da0b8d7c002d382cb9dda0bf706

  • Size

    5.0MB

  • Sample

    220523-x21b4sgacj

  • MD5

    781aee0518bc6ac02c4358c262964731

  • SHA1

    17c780d5a030baf9d84d3276cfb23fe75ff6bd76

  • SHA256

    0183fb721c38a1556692720a9238411d96946da0b8d7c002d382cb9dda0bf706

  • SHA512

    d429864ad7a09c5ef911560e86e46d6ec93bca554364c6921e3e5407722963e3b8d2fca71d70fec2a51a1c85c72a489cef405c2245664ed2cecd5fe5a591aac6

Malware Config

Targets

    • Target

      0183fb721c38a1556692720a9238411d96946da0b8d7c002d382cb9dda0bf706

    • Size

      5.0MB

    • MD5

      781aee0518bc6ac02c4358c262964731

    • SHA1

      17c780d5a030baf9d84d3276cfb23fe75ff6bd76

    • SHA256

      0183fb721c38a1556692720a9238411d96946da0b8d7c002d382cb9dda0bf706

    • SHA512

      d429864ad7a09c5ef911560e86e46d6ec93bca554364c6921e3e5407722963e3b8d2fca71d70fec2a51a1c85c72a489cef405c2245664ed2cecd5fe5a591aac6

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (1273) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

1
T1046

Tasks