General

  • Target

    505fd4e46d0438e9199696c5f3af11e1fccc249d7d1d0297b3fd1b1633bc2ddd

  • Size

    5.0MB

  • Sample

    220719-dt9e9sgfg6

  • MD5

    5a629184d474f6d3bcf2f026a61afec9

  • SHA1

    d7032c0bbd690793b1a7d0072249d3eb6feaab4a

  • SHA256

    505fd4e46d0438e9199696c5f3af11e1fccc249d7d1d0297b3fd1b1633bc2ddd

  • SHA512

    15aa2e10c3b4519cb6eb6cb959c7392597d73d4787b7f6ed0bc2f454fb65280f2291739005047c9dc36020a9ec7f16ea407fa799bbc10c3a47120305be6fa74e

Malware Config

Targets

    • Target

      505fd4e46d0438e9199696c5f3af11e1fccc249d7d1d0297b3fd1b1633bc2ddd

    • Size

      5.0MB

    • MD5

      5a629184d474f6d3bcf2f026a61afec9

    • SHA1

      d7032c0bbd690793b1a7d0072249d3eb6feaab4a

    • SHA256

      505fd4e46d0438e9199696c5f3af11e1fccc249d7d1d0297b3fd1b1633bc2ddd

    • SHA512

      15aa2e10c3b4519cb6eb6cb959c7392597d73d4787b7f6ed0bc2f454fb65280f2291739005047c9dc36020a9ec7f16ea407fa799bbc10c3a47120305be6fa74e

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3141) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1162) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks