General

  • Target

    fbc99e4af741a1ede3251a0b2b061ab1

  • Size

    5.0MB

  • Sample

    220720-b1t8taafhk

  • MD5

    fbc99e4af741a1ede3251a0b2b061ab1

  • SHA1

    706e06855ab84381eaeaaa23fb4882b45ea09c78

  • SHA256

    00a87d1b3e33924891dcc5bed69a7a507fe55ee7058ab1d749941eafa71b31cc

  • SHA512

    1094e0f8c768fedd9593acbb607b69c79fbfe7b0ddb8366bc89d1896b0e76fa9724d2757cc063d77f8dd6f3d3583c0ce2bf266d1675c931ab2debb498627ba67

Malware Config

Targets

    • Target

      fbc99e4af741a1ede3251a0b2b061ab1

    • Size

      5.0MB

    • MD5

      fbc99e4af741a1ede3251a0b2b061ab1

    • SHA1

      706e06855ab84381eaeaaa23fb4882b45ea09c78

    • SHA256

      00a87d1b3e33924891dcc5bed69a7a507fe55ee7058ab1d749941eafa71b31cc

    • SHA512

      1094e0f8c768fedd9593acbb607b69c79fbfe7b0ddb8366bc89d1896b0e76fa9724d2757cc063d77f8dd6f3d3583c0ce2bf266d1675c931ab2debb498627ba67

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3233) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1302) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks