General

  • Target

    ca1a49f52b29493450529af0b2a891c4

  • Size

    5.0MB

  • Sample

    220720-at3e6shgd3

  • MD5

    ca1a49f52b29493450529af0b2a891c4

  • SHA1

    29e01611e9cc77062aa4ef61bd7e019e1e184559

  • SHA256

    f15d3cab30a049cc6bd9e61d97931c0463167ec9daa2b870b87f0ef1bdb151ca

  • SHA512

    f93b769a772623f94e400c86298a4b7fd8fd1a126bebd8326a7fb929745ad48dbcb6c56372f8de3d94dad50d281d53812170af46d94a85ff41d9c9953d5f038f

Malware Config

Targets

    • Target

      ca1a49f52b29493450529af0b2a891c4

    • Size

      5.0MB

    • MD5

      ca1a49f52b29493450529af0b2a891c4

    • SHA1

      29e01611e9cc77062aa4ef61bd7e019e1e184559

    • SHA256

      f15d3cab30a049cc6bd9e61d97931c0463167ec9daa2b870b87f0ef1bdb151ca

    • SHA512

      f93b769a772623f94e400c86298a4b7fd8fd1a126bebd8326a7fb929745ad48dbcb6c56372f8de3d94dad50d281d53812170af46d94a85ff41d9c9953d5f038f

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (2919) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1198) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks