General

  • Target

    35c50669ff577d92f0ffe5f21a394aa1da8e929f12b92594f1f503f9ea263e3e

  • Size

    5.0MB

  • Sample

    220626-24lzqaeagr

  • MD5

    856e92809fcf1535c03dac80c00a0122

  • SHA1

    a27d855df5fb05888023ad4dc23212878b4bfdf6

  • SHA256

    35c50669ff577d92f0ffe5f21a394aa1da8e929f12b92594f1f503f9ea263e3e

  • SHA512

    88b17f5c28ba5a1784cb609f002fba8f94932c47d4957917db225afef59db1313f14d63e5e16c5e0b807786d89af7f17be00d1dd94f2dea48e5585b663e4ce5f

Malware Config

Targets

    • Target

      35c50669ff577d92f0ffe5f21a394aa1da8e929f12b92594f1f503f9ea263e3e

    • Size

      5.0MB

    • MD5

      856e92809fcf1535c03dac80c00a0122

    • SHA1

      a27d855df5fb05888023ad4dc23212878b4bfdf6

    • SHA256

      35c50669ff577d92f0ffe5f21a394aa1da8e929f12b92594f1f503f9ea263e3e

    • SHA512

      88b17f5c28ba5a1784cb609f002fba8f94932c47d4957917db225afef59db1313f14d63e5e16c5e0b807786d89af7f17be00d1dd94f2dea48e5585b663e4ce5f

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

      suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

      suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    • Contacts a large (3211) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks