General

  • Target

    43f4cb1e61aa8d6a587263e2c81107ebf2fb5ef6ca19311dd7447b74b85bb5af

  • Size

    5.0MB

  • Sample

    220707-z4fftsccel

  • MD5

    fc7dab164812e35752c29178fde872db

  • SHA1

    61d950f2cde956960cf07e115f6428edda32d633

  • SHA256

    43f4cb1e61aa8d6a587263e2c81107ebf2fb5ef6ca19311dd7447b74b85bb5af

  • SHA512

    986558dc6d4a28aaaad82e53df2acf09db8e3c8a939e04de465aaa18b2c212595ba3e75f60ce9c7b6d879b8d81707f414d385037fb21146d4223cb3645288b1f

Malware Config

Targets

    • Target

      43f4cb1e61aa8d6a587263e2c81107ebf2fb5ef6ca19311dd7447b74b85bb5af

    • Size

      5.0MB

    • MD5

      fc7dab164812e35752c29178fde872db

    • SHA1

      61d950f2cde956960cf07e115f6428edda32d633

    • SHA256

      43f4cb1e61aa8d6a587263e2c81107ebf2fb5ef6ca19311dd7447b74b85bb5af

    • SHA512

      986558dc6d4a28aaaad82e53df2acf09db8e3c8a939e04de465aaa18b2c212595ba3e75f60ce9c7b6d879b8d81707f414d385037fb21146d4223cb3645288b1f

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (2728) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (772) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks