General

  • Target

    3214a6bc1516237a1dd43a7362e4c5d8a48528aeadd8151eae8e9030fd98f273

  • Size

    5.0MB

  • Sample

    220620-t25p2sehdm

  • MD5

    c6f93103b29652dbe18510ea58016058

  • SHA1

    99f707cdd51c938b85b43413d982325919f18cd1

  • SHA256

    3214a6bc1516237a1dd43a7362e4c5d8a48528aeadd8151eae8e9030fd98f273

  • SHA512

    4a243ef4bf2ae2b01030c00f576c4c83a378f280e03f356c7298d5eaa41720722616da5dd7e4466b572158e658a01b92e09ff245b9c218949945e061bb40980d

Malware Config

Targets

    • Target

      3214a6bc1516237a1dd43a7362e4c5d8a48528aeadd8151eae8e9030fd98f273

    • Size

      5.0MB

    • MD5

      c6f93103b29652dbe18510ea58016058

    • SHA1

      99f707cdd51c938b85b43413d982325919f18cd1

    • SHA256

      3214a6bc1516237a1dd43a7362e4c5d8a48528aeadd8151eae8e9030fd98f273

    • SHA512

      4a243ef4bf2ae2b01030c00f576c4c83a378f280e03f356c7298d5eaa41720722616da5dd7e4466b572158e658a01b92e09ff245b9c218949945e061bb40980d

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

      suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

      suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    • Contacts a large (2148) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (821) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

2
T1046

Tasks