General

  • Target

    ad84accbc8a5107e950afac47e171157

  • Size

    5.0MB

  • Sample

    220720-ajxryahff9

  • MD5

    ad84accbc8a5107e950afac47e171157

  • SHA1

    e8f49ebc884bdab46ae1984145a1f680efd2c4e2

  • SHA256

    36dc0aae52946e3f9530c53925301bb8dbfa8216291705d99ef913d55f6ec1c9

  • SHA512

    88f0edb164c7164a8b5377b4e079ab4adc49d00a8b1f9a1424a5a0838ee4dc23ca37b9e72b4cae801d3b7663229274bfeb93d95d5118869b2fbcef72fe257482

Malware Config

Targets

    • Target

      ad84accbc8a5107e950afac47e171157

    • Size

      5.0MB

    • MD5

      ad84accbc8a5107e950afac47e171157

    • SHA1

      e8f49ebc884bdab46ae1984145a1f680efd2c4e2

    • SHA256

      36dc0aae52946e3f9530c53925301bb8dbfa8216291705d99ef913d55f6ec1c9

    • SHA512

      88f0edb164c7164a8b5377b4e079ab4adc49d00a8b1f9a1424a5a0838ee4dc23ca37b9e72b4cae801d3b7663229274bfeb93d95d5118869b2fbcef72fe257482

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3060) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (993) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks