Resubmissions

24-06-2022 15:06

220624-sgy64adbbj 10

22-06-2022 08:47

220622-kpxz1aegd4 10

General

  • Target

    2e67865b954436c36f6233e1cd7337e643f4369639a7c8f7175721e884981884

  • Size

    5.0MB

  • Sample

    220624-sgy64adbbj

  • MD5

    5d446ad3d84db7a2acad9b403129e072

  • SHA1

    38bb2766c0bf3f1a06ef60f4ec9d1cf35c878964

  • SHA256

    2e67865b954436c36f6233e1cd7337e643f4369639a7c8f7175721e884981884

  • SHA512

    3d376e294269ffdf5c18972512ca2e89d6735705318d51dd1d8d3ea12d0b301be052b979243cb1e9e546693d3f762083fcf58817a8b91b6555ffc97ff5758452

Malware Config

Targets

    • Target

      2e67865b954436c36f6233e1cd7337e643f4369639a7c8f7175721e884981884

    • Size

      5.0MB

    • MD5

      5d446ad3d84db7a2acad9b403129e072

    • SHA1

      38bb2766c0bf3f1a06ef60f4ec9d1cf35c878964

    • SHA256

      2e67865b954436c36f6233e1cd7337e643f4369639a7c8f7175721e884981884

    • SHA512

      3d376e294269ffdf5c18972512ca2e89d6735705318d51dd1d8d3ea12d0b301be052b979243cb1e9e546693d3f762083fcf58817a8b91b6555ffc97ff5758452

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

      suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

      suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    • Contacts a large (12096) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

2
T1046

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks