General

  • Target

    30dfe8984c16055acdb3720a8e2c51ad67dfc4bcf274f9d6df8d7ad206b0d726

  • Size

    5.0MB

  • Sample

    220621-b2w4ssaec2

  • MD5

    4bbb8df5d25162f260e362c7dbce13ba

  • SHA1

    67e8415d133178158461b946d5ca0533e1015409

  • SHA256

    30dfe8984c16055acdb3720a8e2c51ad67dfc4bcf274f9d6df8d7ad206b0d726

  • SHA512

    9ccf0cfa8078450a16fffd5c4a0fe79cb2cbe621b9ebf5224d3318d45602b3569ee8f470c882885cc049eab46ef61b5ecb09c7e6d7646d962eee917b7b043267

Malware Config

Targets

    • Target

      30dfe8984c16055acdb3720a8e2c51ad67dfc4bcf274f9d6df8d7ad206b0d726

    • Size

      5.0MB

    • MD5

      4bbb8df5d25162f260e362c7dbce13ba

    • SHA1

      67e8415d133178158461b946d5ca0533e1015409

    • SHA256

      30dfe8984c16055acdb3720a8e2c51ad67dfc4bcf274f9d6df8d7ad206b0d726

    • SHA512

      9ccf0cfa8078450a16fffd5c4a0fe79cb2cbe621b9ebf5224d3318d45602b3569ee8f470c882885cc049eab46ef61b5ecb09c7e6d7646d962eee917b7b043267

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

      suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

      suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    • Contacts a large (3092) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1266) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks