General

  • Target

    2259ebf3658c2dd6ab1e53e3c23fad4d

  • Size

    5.0MB

  • Sample

    220720-b3kgdsagaj

  • MD5

    2259ebf3658c2dd6ab1e53e3c23fad4d

  • SHA1

    0e1170d4132d995d404b86772cf41b399aa967d4

  • SHA256

    66f1d8d65c041689a1c05c661794e44bab00a546fac687089bab07a556c859ce

  • SHA512

    6b2f2ef1eb186923d64f86fb3fe9a08baac2089ec1d405a931c33c1c097692685ab4514aeeb9896ced9497709269120519695c8c26d04575bf26eba3d855aae8

Malware Config

Targets

    • Target

      2259ebf3658c2dd6ab1e53e3c23fad4d

    • Size

      5.0MB

    • MD5

      2259ebf3658c2dd6ab1e53e3c23fad4d

    • SHA1

      0e1170d4132d995d404b86772cf41b399aa967d4

    • SHA256

      66f1d8d65c041689a1c05c661794e44bab00a546fac687089bab07a556c859ce

    • SHA512

      6b2f2ef1eb186923d64f86fb3fe9a08baac2089ec1d405a931c33c1c097692685ab4514aeeb9896ced9497709269120519695c8c26d04575bf26eba3d855aae8

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3169) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1123) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks