General

  • Target

    21d52f970117819dab150b9d71d64d2afb3794ca7c6de574321d27b1849b71b0

  • Size

    5.0MB

  • Sample

    220612-h41ckaffb6

  • MD5

    ffe9ccaad1190c36b7df3b8bdcb45875

  • SHA1

    1a7ed5614247c958d2b3f8da2411ddf5a85e16a9

  • SHA256

    21d52f970117819dab150b9d71d64d2afb3794ca7c6de574321d27b1849b71b0

  • SHA512

    0a16711d9a1a78341b32ae31f768cb2afadcd4d61878fa48d23572efae7d6c99066c17154290d82cdd8916a3fa4e756c7be887f5f6c58be0c63fd112cae965db

Malware Config

Targets

    • Target

      21d52f970117819dab150b9d71d64d2afb3794ca7c6de574321d27b1849b71b0

    • Size

      5.0MB

    • MD5

      ffe9ccaad1190c36b7df3b8bdcb45875

    • SHA1

      1a7ed5614247c958d2b3f8da2411ddf5a85e16a9

    • SHA256

      21d52f970117819dab150b9d71d64d2afb3794ca7c6de574321d27b1849b71b0

    • SHA512

      0a16711d9a1a78341b32ae31f768cb2afadcd4d61878fa48d23572efae7d6c99066c17154290d82cdd8916a3fa4e756c7be887f5f6c58be0c63fd112cae965db

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (2864) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1014) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks