General

  • Target

    32e43652533f32ad08ba96a0a896c05ce865c01880641ff21008a61169a50038

  • Size

    5.0MB

  • Sample

    220620-e8qgdahac5

  • MD5

    64c3e9f584a0b0fdfaf114c3c78273d9

  • SHA1

    df7a6be71e6eba5d703bb1f226feb4012b2bf432

  • SHA256

    32e43652533f32ad08ba96a0a896c05ce865c01880641ff21008a61169a50038

  • SHA512

    f899df01222018f14e7575954c271d4c7120d11b23e2314d59ec5ae9793c60634a66309777449fc084f3d8d5586790f659a509fcedf4a503391527789fed0576

Malware Config

Targets

    • Target

      32e43652533f32ad08ba96a0a896c05ce865c01880641ff21008a61169a50038

    • Size

      5.0MB

    • MD5

      64c3e9f584a0b0fdfaf114c3c78273d9

    • SHA1

      df7a6be71e6eba5d703bb1f226feb4012b2bf432

    • SHA256

      32e43652533f32ad08ba96a0a896c05ce865c01880641ff21008a61169a50038

    • SHA512

      f899df01222018f14e7575954c271d4c7120d11b23e2314d59ec5ae9793c60634a66309777449fc084f3d8d5586790f659a509fcedf4a503391527789fed0576

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3077) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1262) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks