General

  • Target

    42e4a37e63221e523a92700253c928d9f14022bc4078a88182e0f5a3021b3f3c

  • Size

    5.0MB

  • Sample

    220708-a21asacgh2

  • MD5

    3ce4cffc202ddafe9e2b2c8f570f4e16

  • SHA1

    f331a320d11d62823847ed76228e2e706df6aa2c

  • SHA256

    42e4a37e63221e523a92700253c928d9f14022bc4078a88182e0f5a3021b3f3c

  • SHA512

    24484046e1075e475d58aff29dbe62471bd62925d91209a961fee74007a869c4e5bd4484d38984f65bcff3b7a65adccb711a206a3b25ccd45b894c3065cb4e95

Malware Config

Targets

    • Target

      42e4a37e63221e523a92700253c928d9f14022bc4078a88182e0f5a3021b3f3c

    • Size

      5.0MB

    • MD5

      3ce4cffc202ddafe9e2b2c8f570f4e16

    • SHA1

      f331a320d11d62823847ed76228e2e706df6aa2c

    • SHA256

      42e4a37e63221e523a92700253c928d9f14022bc4078a88182e0f5a3021b3f3c

    • SHA512

      24484046e1075e475d58aff29dbe62471bd62925d91209a961fee74007a869c4e5bd4484d38984f65bcff3b7a65adccb711a206a3b25ccd45b894c3065cb4e95

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

      suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

      suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    • Contacts a large (2070) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1118) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

2
T1046

Tasks