General

  • Target

    28a084d5a9f7a0d1c1f336f3f75581e6a9cae4dc0a34e44f6fcc79c3dda4dfbe

  • Size

    5.0MB

  • Sample

    220615-vhjh5sbcc4

  • MD5

    944fee9b45c08401b1eec8dc1cc06d0c

  • SHA1

    1cc8b3a27c4f083ebd4787e3fbb8ea3c90d5fb00

  • SHA256

    28a084d5a9f7a0d1c1f336f3f75581e6a9cae4dc0a34e44f6fcc79c3dda4dfbe

  • SHA512

    c31a988b8f74d1ef554329451b45961c698e767f7f6796e1cd9ccb74c420411f9023e5b842cdd272f5da4ce0a7eacdbb1ac97a51cb681e3925a86e9f4d0111d7

Malware Config

Targets

    • Target

      28a084d5a9f7a0d1c1f336f3f75581e6a9cae4dc0a34e44f6fcc79c3dda4dfbe

    • Size

      5.0MB

    • MD5

      944fee9b45c08401b1eec8dc1cc06d0c

    • SHA1

      1cc8b3a27c4f083ebd4787e3fbb8ea3c90d5fb00

    • SHA256

      28a084d5a9f7a0d1c1f336f3f75581e6a9cae4dc0a34e44f6fcc79c3dda4dfbe

    • SHA512

      c31a988b8f74d1ef554329451b45961c698e767f7f6796e1cd9ccb74c420411f9023e5b842cdd272f5da4ce0a7eacdbb1ac97a51cb681e3925a86e9f4d0111d7

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

      suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

      suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    • Contacts a large (3283) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1243) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks