General

  • Target

    2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623

  • Size

    5.0MB

  • Sample

    220614-21qhqshbgq

  • MD5

    3340eec1f90de20b798e5f6c2a7b6434

  • SHA1

    ba6ab639f7ddf21da263ac9c7a48572c31d87d10

  • SHA256

    2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623

  • SHA512

    541fe3301b13d69bf75c738f95919af2cb52e89911c9b9985403179d0d9efe14f8cdfdad8eacc128f8cb4f014a774726db3ab2de36e7c6b335beba53c532ea0d

Malware Config

Targets

    • Target

      2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623

    • Size

      5.0MB

    • MD5

      3340eec1f90de20b798e5f6c2a7b6434

    • SHA1

      ba6ab639f7ddf21da263ac9c7a48572c31d87d10

    • SHA256

      2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623

    • SHA512

      541fe3301b13d69bf75c738f95919af2cb52e89911c9b9985403179d0d9efe14f8cdfdad8eacc128f8cb4f014a774726db3ab2de36e7c6b335beba53c532ea0d

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

      suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

      suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    • Contacts a large (3293) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (774) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks