General

  • Target

    39c7bdb2d0fc8f2b11de1e781d88296ac233b0b6a8a9cea08f230661af75fdec

  • Size

    5.0MB

  • Sample

    220625-kdx6mafcg5

  • MD5

    0a2c063f550e10312445b60810881a76

  • SHA1

    3e2d2bf020e22fd4b58a118d7111606703e1cb71

  • SHA256

    39c7bdb2d0fc8f2b11de1e781d88296ac233b0b6a8a9cea08f230661af75fdec

  • SHA512

    2085766d747968cf42f55829481696ccb68f46bff602ac32019d1fd48122a94d7f522e1470371748f4f0263bcfb5375c050d17e9a333892030022fab4ce3305f

Malware Config

Targets

    • Target

      39c7bdb2d0fc8f2b11de1e781d88296ac233b0b6a8a9cea08f230661af75fdec

    • Size

      5.0MB

    • MD5

      0a2c063f550e10312445b60810881a76

    • SHA1

      3e2d2bf020e22fd4b58a118d7111606703e1cb71

    • SHA256

      39c7bdb2d0fc8f2b11de1e781d88296ac233b0b6a8a9cea08f230661af75fdec

    • SHA512

      2085766d747968cf42f55829481696ccb68f46bff602ac32019d1fd48122a94d7f522e1470371748f4f0263bcfb5375c050d17e9a333892030022fab4ce3305f

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

      suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

      suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    • Contacts a large (2832) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1279) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks