General

  • Target

    1fac100d4c262c460a3028c417d0793fdc97dee5e4330cf44cb61e3347e58059

  • Size

    5.0MB

  • Sample

    220612-vphkesdad2

  • MD5

    c335ac7e229f289831b9a8d849a5ac8d

  • SHA1

    2a389f32d429343a0bd58bbff71a9931d132dc70

  • SHA256

    1fac100d4c262c460a3028c417d0793fdc97dee5e4330cf44cb61e3347e58059

  • SHA512

    3dc3cf7878cf26831b229adc38402cdfdd7ee0e1aaacff1e17e53325b2184cd22ef78f1551c129927c86dd49fa7eb1347554f78a1528fa7affdc5b7692ef190b

Malware Config

Targets

    • Target

      1fac100d4c262c460a3028c417d0793fdc97dee5e4330cf44cb61e3347e58059

    • Size

      5.0MB

    • MD5

      c335ac7e229f289831b9a8d849a5ac8d

    • SHA1

      2a389f32d429343a0bd58bbff71a9931d132dc70

    • SHA256

      1fac100d4c262c460a3028c417d0793fdc97dee5e4330cf44cb61e3347e58059

    • SHA512

      3dc3cf7878cf26831b229adc38402cdfdd7ee0e1aaacff1e17e53325b2184cd22ef78f1551c129927c86dd49fa7eb1347554f78a1528fa7affdc5b7692ef190b

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

      suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

      suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    • Contacts a large (3217) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

2
T1046

Tasks