General

  • Target

    3d1e0c4f0ad98399d383ff63d4511e23dbbd0c421ce1aa00a7242c1ea9ccf96b

  • Size

    5.0MB

  • Sample

    220703-esd4eageh5

  • MD5

    af7cb7b0058e69830349b8437729633e

  • SHA1

    a042a9bd9897515a125df309ca60de4b5451005a

  • SHA256

    3d1e0c4f0ad98399d383ff63d4511e23dbbd0c421ce1aa00a7242c1ea9ccf96b

  • SHA512

    be14fd51eceaf4397d15ad2874cfc6055ee536894498e8e235c156183a349547ff7b61aee2925f957e56ba7190149a40968c6e6ead526b8fae90f012f443d6d3

Malware Config

Targets

    • Target

      3d1e0c4f0ad98399d383ff63d4511e23dbbd0c421ce1aa00a7242c1ea9ccf96b

    • Size

      5.0MB

    • MD5

      af7cb7b0058e69830349b8437729633e

    • SHA1

      a042a9bd9897515a125df309ca60de4b5451005a

    • SHA256

      3d1e0c4f0ad98399d383ff63d4511e23dbbd0c421ce1aa00a7242c1ea9ccf96b

    • SHA512

      be14fd51eceaf4397d15ad2874cfc6055ee536894498e8e235c156183a349547ff7b61aee2925f957e56ba7190149a40968c6e6ead526b8fae90f012f443d6d3

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3184) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1192) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks