General

  • Target

    227c0e41aa7ff9068af59279585a7125b9aa62882e1153af1eefa08387a3a856

  • Size

    5.0MB

  • Sample

    220612-fqmhfafdgl

  • MD5

    9e883ca98bfa04f765894992bf33068b

  • SHA1

    bfa21956072b49ecc307276bf15049d264c8419e

  • SHA256

    227c0e41aa7ff9068af59279585a7125b9aa62882e1153af1eefa08387a3a856

  • SHA512

    daa3a69a5aaf1c6bbce9ce59908a153e6ef542d5bf780e9600f19e20b0f79186072c1721ddf9d63cd6a3fec0575181aca02c9d2230532473bb0a69b39d4ac16a

Malware Config

Targets

    • Target

      227c0e41aa7ff9068af59279585a7125b9aa62882e1153af1eefa08387a3a856

    • Size

      5.0MB

    • MD5

      9e883ca98bfa04f765894992bf33068b

    • SHA1

      bfa21956072b49ecc307276bf15049d264c8419e

    • SHA256

      227c0e41aa7ff9068af59279585a7125b9aa62882e1153af1eefa08387a3a856

    • SHA512

      daa3a69a5aaf1c6bbce9ce59908a153e6ef542d5bf780e9600f19e20b0f79186072c1721ddf9d63cd6a3fec0575181aca02c9d2230532473bb0a69b39d4ac16a

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

      suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

      suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    • Contacts a large (2296) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (910) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

2
T1046

Tasks