General

  • Target

    84c2b1a2d6c00476b0aea797cfc10543

  • Size

    5.0MB

  • Sample

    220720-a33sashgh9

  • MD5

    84c2b1a2d6c00476b0aea797cfc10543

  • SHA1

    1061bab1a894595bbf7f5e30b40fb0f9bac9fe41

  • SHA256

    8f683813f5d1c56c69aa0131562fbdf9dbc61a140e8936015880d42c7c03cacd

  • SHA512

    e715890991da39e558d939352a6b9d2df8ef5e079e1ac97f09e7949b77facae7eaf01ee5530ae0274081963fa31a93e8e509792e43a80cb1d29cabccb0d785a5

Malware Config

Targets

    • Target

      84c2b1a2d6c00476b0aea797cfc10543

    • Size

      5.0MB

    • MD5

      84c2b1a2d6c00476b0aea797cfc10543

    • SHA1

      1061bab1a894595bbf7f5e30b40fb0f9bac9fe41

    • SHA256

      8f683813f5d1c56c69aa0131562fbdf9dbc61a140e8936015880d42c7c03cacd

    • SHA512

      e715890991da39e558d939352a6b9d2df8ef5e079e1ac97f09e7949b77facae7eaf01ee5530ae0274081963fa31a93e8e509792e43a80cb1d29cabccb0d785a5

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3100) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1242) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks