General

  • Target

    36dde0acce43dac1e5baa8e4b121a96f9aa0315c4386a203f6ea4e56534c7859

  • Size

    5.0MB

  • Sample

    220626-bk8q9sddc2

  • MD5

    59e0d7e76406e4c90cba5d6be0fc6902

  • SHA1

    f564280d12b7da6b0063243fc649ce95d3e89705

  • SHA256

    36dde0acce43dac1e5baa8e4b121a96f9aa0315c4386a203f6ea4e56534c7859

  • SHA512

    b66eaf5ce643d90f8b2266d0cc26508b55d98458e140b13db24d1ca82a54d67f0c009ac8173753fca30f873e07cfd1e08d7100ed1a2e99d59374271834149413

Malware Config

Targets

    • Target

      36dde0acce43dac1e5baa8e4b121a96f9aa0315c4386a203f6ea4e56534c7859

    • Size

      5.0MB

    • MD5

      59e0d7e76406e4c90cba5d6be0fc6902

    • SHA1

      f564280d12b7da6b0063243fc649ce95d3e89705

    • SHA256

      36dde0acce43dac1e5baa8e4b121a96f9aa0315c4386a203f6ea4e56534c7859

    • SHA512

      b66eaf5ce643d90f8b2266d0cc26508b55d98458e140b13db24d1ca82a54d67f0c009ac8173753fca30f873e07cfd1e08d7100ed1a2e99d59374271834149413

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

      suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

      suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    • Contacts a large (3159) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1317) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks