General

  • Target

    13a24eec00acccae3b1ed068c0748cee

  • Size

    5.0MB

  • Sample

    220720-a9swnsadek

  • MD5

    13a24eec00acccae3b1ed068c0748cee

  • SHA1

    2b8aa6d16a9dab28c936444d48c093c765f021e2

  • SHA256

    731f785e4a1c642ff05b066ce96d1014eb83f6132a3bc20cae49fda009eb5129

  • SHA512

    009290ff3292a3cb672b2cf567ae21522afb27b4787f1c93c07909c371df68a497808101c12d6c7a7fb6a911166ca1558cc8397558ab926906e9770e3fe4ea08

Malware Config

Targets

    • Target

      13a24eec00acccae3b1ed068c0748cee

    • Size

      5.0MB

    • MD5

      13a24eec00acccae3b1ed068c0748cee

    • SHA1

      2b8aa6d16a9dab28c936444d48c093c765f021e2

    • SHA256

      731f785e4a1c642ff05b066ce96d1014eb83f6132a3bc20cae49fda009eb5129

    • SHA512

      009290ff3292a3cb672b2cf567ae21522afb27b4787f1c93c07909c371df68a497808101c12d6c7a7fb6a911166ca1558cc8397558ab926906e9770e3fe4ea08

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3248) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1250) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks