General

  • Target

    34d01301694469e1cf68caa738db6cd0373bcc785649fb2f108fc39428554a12

  • Size

    5.0MB

  • Sample

    220619-yn17xsafgm

  • MD5

    ab02e31aa2a8ea6eecc684bfa2e3c185

  • SHA1

    6665249de09b0900743d45e141c0ec186d2e00b2

  • SHA256

    34d01301694469e1cf68caa738db6cd0373bcc785649fb2f108fc39428554a12

  • SHA512

    b3b8f69b5ee03890c41a4619d50dc3bcb569b5921395b226f52f790a53b553006e9ac9be417667a31664443bf7bf6cb0928c63873ffab4267268938afa6923b0

Malware Config

Targets

    • Target

      34d01301694469e1cf68caa738db6cd0373bcc785649fb2f108fc39428554a12

    • Size

      5.0MB

    • MD5

      ab02e31aa2a8ea6eecc684bfa2e3c185

    • SHA1

      6665249de09b0900743d45e141c0ec186d2e00b2

    • SHA256

      34d01301694469e1cf68caa738db6cd0373bcc785649fb2f108fc39428554a12

    • SHA512

      b3b8f69b5ee03890c41a4619d50dc3bcb569b5921395b226f52f790a53b553006e9ac9be417667a31664443bf7bf6cb0928c63873ffab4267268938afa6923b0

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

      suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

      suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    • Contacts a large (2246) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1066) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

2
T1046

Tasks