General

  • Target

    b53c92219431e5c5e3e6874936b4aeff

  • Size

    5.0MB

  • Sample

    220720-a87y7shhd6

  • MD5

    b53c92219431e5c5e3e6874936b4aeff

  • SHA1

    34a247ba360172b5ef0d0d5788f70dcd0bad179d

  • SHA256

    33947a48eb1a1d6cda016fb2259046a88a422af43f66f8ec5fcb6b23244240b7

  • SHA512

    91f87bd6971954747d8d1c57a693f165217e5de5de4b877f0cfe2a870fe1cbb203498b267771499f3139de4abc55953d7cd7eedc451d2a028bcc1c1ce81a449c

Malware Config

Targets

    • Target

      b53c92219431e5c5e3e6874936b4aeff

    • Size

      5.0MB

    • MD5

      b53c92219431e5c5e3e6874936b4aeff

    • SHA1

      34a247ba360172b5ef0d0d5788f70dcd0bad179d

    • SHA256

      33947a48eb1a1d6cda016fb2259046a88a422af43f66f8ec5fcb6b23244240b7

    • SHA512

      91f87bd6971954747d8d1c57a693f165217e5de5de4b877f0cfe2a870fe1cbb203498b267771499f3139de4abc55953d7cd7eedc451d2a028bcc1c1ce81a449c

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3158) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1345) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks