General

  • Target

    85d3a6eb4f1c04311c52891051503b3a

  • Size

    5.0MB

  • Sample

    220720-b3j6maabe8

  • MD5

    85d3a6eb4f1c04311c52891051503b3a

  • SHA1

    b69a6112fe9e3f1903e57eda73e990c4ffadeb6d

  • SHA256

    c9db9ce17eb23dd902c86fdf9190599718bb01572983cdb14e10f9c4d71a3977

  • SHA512

    acdf2290b61bc08c6bb693598e5e081e8c2f1408fcd08818b2ecf32ec7c84a2ebb0ff36630c77f2cd7b19cb9f802c6884a6a7a9ceb69cc8d23c0d59b42043e57

Malware Config

Targets

    • Target

      85d3a6eb4f1c04311c52891051503b3a

    • Size

      5.0MB

    • MD5

      85d3a6eb4f1c04311c52891051503b3a

    • SHA1

      b69a6112fe9e3f1903e57eda73e990c4ffadeb6d

    • SHA256

      c9db9ce17eb23dd902c86fdf9190599718bb01572983cdb14e10f9c4d71a3977

    • SHA512

      acdf2290b61bc08c6bb693598e5e081e8c2f1408fcd08818b2ecf32ec7c84a2ebb0ff36630c77f2cd7b19cb9f802c6884a6a7a9ceb69cc8d23c0d59b42043e57

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3233) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1269) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks