General

  • Target

    43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952

  • Size

    5.0MB

  • Sample

    220707-1twkqsdegp

  • MD5

    65047d9e2f90ed75a133096d982c44b5

  • SHA1

    51fa0dd51eb722be4c07daf5c4879a92552b88c5

  • SHA256

    43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952

  • SHA512

    b033bc9c3b28bb738bd80f01888998503b277ab8ff6cb058da5c0ca9ed581b4b83a68280b4622699c806af41801e71e3b9301896209eda01d829c2ad53d57d9f

Malware Config

Targets

    • Target

      43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952

    • Size

      5.0MB

    • MD5

      65047d9e2f90ed75a133096d982c44b5

    • SHA1

      51fa0dd51eb722be4c07daf5c4879a92552b88c5

    • SHA256

      43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952

    • SHA512

      b033bc9c3b28bb738bd80f01888998503b277ab8ff6cb058da5c0ca9ed581b4b83a68280b4622699c806af41801e71e3b9301896209eda01d829c2ad53d57d9f

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

      suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

      suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    • Contacts a large (2335) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

1
T1046

Tasks