General

  • Target

    44e7f44b6edf55d6a96cf66d9d75f65acc9cd2db54760e20729d5d9d09877537

  • Size

    5.0MB

  • Sample

    220707-wdn4hafdg5

  • MD5

    4af86c6c774337fab08e425232aa046d

  • SHA1

    3d496391ade070cc84b0db60c96bbacef6489934

  • SHA256

    44e7f44b6edf55d6a96cf66d9d75f65acc9cd2db54760e20729d5d9d09877537

  • SHA512

    5fcf35d5f052f00773e19a152cef794f84a5a8671b3fc7770a2a435775144ea11720bd2ebfc3f142cafd9bf8251d153155e3be2a44615d5de62ee3824286d1d6

Malware Config

Targets

    • Target

      44e7f44b6edf55d6a96cf66d9d75f65acc9cd2db54760e20729d5d9d09877537

    • Size

      5.0MB

    • MD5

      4af86c6c774337fab08e425232aa046d

    • SHA1

      3d496391ade070cc84b0db60c96bbacef6489934

    • SHA256

      44e7f44b6edf55d6a96cf66d9d75f65acc9cd2db54760e20729d5d9d09877537

    • SHA512

      5fcf35d5f052f00773e19a152cef794f84a5a8671b3fc7770a2a435775144ea11720bd2ebfc3f142cafd9bf8251d153155e3be2a44615d5de62ee3824286d1d6

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (2724) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1277) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks