General

  • Target

    37b5543ffedb77305379e07c4e17b637e52e6cfc26669357e15fa8388a051e31

  • Size

    5.0MB

  • Sample

    220625-2bx7aageb3

  • MD5

    0e6c5008129bb859f0a760e1167f4097

  • SHA1

    f8bea1b72244172d15da1a4ee05d013db287abc4

  • SHA256

    37b5543ffedb77305379e07c4e17b637e52e6cfc26669357e15fa8388a051e31

  • SHA512

    40fa30544386a46297ebeaea229e52fb459135314df7b0119bc3275ee2b6d03aed6a183da343652d335edd168b414c17a34ab807971e4c8ad450e6b0bbb1e4b1

Malware Config

Targets

    • Target

      37b5543ffedb77305379e07c4e17b637e52e6cfc26669357e15fa8388a051e31

    • Size

      5.0MB

    • MD5

      0e6c5008129bb859f0a760e1167f4097

    • SHA1

      f8bea1b72244172d15da1a4ee05d013db287abc4

    • SHA256

      37b5543ffedb77305379e07c4e17b637e52e6cfc26669357e15fa8388a051e31

    • SHA512

      40fa30544386a46297ebeaea229e52fb459135314df7b0119bc3275ee2b6d03aed6a183da343652d335edd168b414c17a34ab807971e4c8ad450e6b0bbb1e4b1

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (2722) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1243) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks