General

  • Target

    314a2f9b8b7b9caf6b83142e4954de026aeacec7a78467e121d289c5389fee0b

  • Size

    5.0MB

  • Sample

    220620-3hhkvafeg7

  • MD5

    b3fcc20dffa1033a5e3ce437f38f6e02

  • SHA1

    fb0a472b6a360834e603385283d1780d1eda050a

  • SHA256

    314a2f9b8b7b9caf6b83142e4954de026aeacec7a78467e121d289c5389fee0b

  • SHA512

    8979a5a95ec1aa841c9cafbc75990c3a6b426fad4fd1a348d3ce793d733911d76216c7b3ae8645a197439b2af69b596718f5c6c9f7edeb70268157400809d178

Malware Config

Targets

    • Target

      314a2f9b8b7b9caf6b83142e4954de026aeacec7a78467e121d289c5389fee0b

    • Size

      5.0MB

    • MD5

      b3fcc20dffa1033a5e3ce437f38f6e02

    • SHA1

      fb0a472b6a360834e603385283d1780d1eda050a

    • SHA256

      314a2f9b8b7b9caf6b83142e4954de026aeacec7a78467e121d289c5389fee0b

    • SHA512

      8979a5a95ec1aa841c9cafbc75990c3a6b426fad4fd1a348d3ce793d733911d76216c7b3ae8645a197439b2af69b596718f5c6c9f7edeb70268157400809d178

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

      suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

      suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    • Contacts a large (3196) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1255) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks