General

  • Target

    229ad4db9e509757866c25d9412c32e2fc538ba4f3911d13df1985eb0f365a70

  • Size

    5.0MB

  • Sample

    220612-e966hseffp

  • MD5

    9ca9ff292471bda00aff71fc54b063e2

  • SHA1

    cc1f92e9c8e01283088c58f0fc82a479a38d325c

  • SHA256

    229ad4db9e509757866c25d9412c32e2fc538ba4f3911d13df1985eb0f365a70

  • SHA512

    d932407e6e85bb0137b3486a8219ac251128546472168888456947059da63a46602b363d343b31f7e193f97578bb8d9f1790d0131a5df64917c51b4dccfb28b9

Malware Config

Targets

    • Target

      229ad4db9e509757866c25d9412c32e2fc538ba4f3911d13df1985eb0f365a70

    • Size

      5.0MB

    • MD5

      9ca9ff292471bda00aff71fc54b063e2

    • SHA1

      cc1f92e9c8e01283088c58f0fc82a479a38d325c

    • SHA256

      229ad4db9e509757866c25d9412c32e2fc538ba4f3911d13df1985eb0f365a70

    • SHA512

      d932407e6e85bb0137b3486a8219ac251128546472168888456947059da63a46602b363d343b31f7e193f97578bb8d9f1790d0131a5df64917c51b4dccfb28b9

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (2617) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1259) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

2
T1046

Tasks