General

  • Target

    f5ce36be7c36f6a14247ec9eb9fbb60f

  • Size

    5.0MB

  • Sample

    220719-3m9vwsaabq

  • MD5

    f5ce36be7c36f6a14247ec9eb9fbb60f

  • SHA1

    29e43273e7d7444417648f5e04496d386f105b94

  • SHA256

    59e8f04fccfa53cf9fca832111b20dda0f304036f78105c7724c7f5e9e9a5975

  • SHA512

    e93a7d44a410c2badc1937697a8c87ae9173d8aaa5fdf5da98ca03366152b2c51bc6f0429023e0b1cf696f67bf1190b6dce4677ab809899d3e760d077c9eefa3

Malware Config

Targets

    • Target

      f5ce36be7c36f6a14247ec9eb9fbb60f

    • Size

      5.0MB

    • MD5

      f5ce36be7c36f6a14247ec9eb9fbb60f

    • SHA1

      29e43273e7d7444417648f5e04496d386f105b94

    • SHA256

      59e8f04fccfa53cf9fca832111b20dda0f304036f78105c7724c7f5e9e9a5975

    • SHA512

      e93a7d44a410c2badc1937697a8c87ae9173d8aaa5fdf5da98ca03366152b2c51bc6f0429023e0b1cf696f67bf1190b6dce4677ab809899d3e760d077c9eefa3

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3015) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1003) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks