General

  • Target

    140b4c0772314e0c81ac1b899fb2aae8

  • Size

    5.0MB

  • Sample

    220719-3mpjysaabj

  • MD5

    140b4c0772314e0c81ac1b899fb2aae8

  • SHA1

    ea83977968c070d0383ebda2e6087bad4869d682

  • SHA256

    b6f30461db13d84d4c28627955137bf0b1f53b9bd1a76f0484baf0a3ffe1c212

  • SHA512

    27b0a116d75890882c0ebb30e47506428551ab97ced0ed121b0d39d7baab58747b6b13f7f7658cea9c47b7988b107cd6baccebed7825efd916c08adf58eadb10

Malware Config

Targets

    • Target

      140b4c0772314e0c81ac1b899fb2aae8

    • Size

      5.0MB

    • MD5

      140b4c0772314e0c81ac1b899fb2aae8

    • SHA1

      ea83977968c070d0383ebda2e6087bad4869d682

    • SHA256

      b6f30461db13d84d4c28627955137bf0b1f53b9bd1a76f0484baf0a3ffe1c212

    • SHA512

      27b0a116d75890882c0ebb30e47506428551ab97ced0ed121b0d39d7baab58747b6b13f7f7658cea9c47b7988b107cd6baccebed7825efd916c08adf58eadb10

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3275) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1239) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks