General

  • Target

    6eee80b7e7fd17c1b778b19ea770cef4

  • Size

    5.0MB

  • Sample

    220720-b4n6zaagbj

  • MD5

    6eee80b7e7fd17c1b778b19ea770cef4

  • SHA1

    038762f633fdf30aa2293480f3d3137836d9c4b1

  • SHA256

    2b5cbf5e13320559b9362865a4167d3a4fb2400a81529dd37e54344071a41ad9

  • SHA512

    a2147b6ca7f92831726b6944fdfcb9cd0b6dc7cb89132cac6eabea5a9d4d1e7f312eadd7c8d7784df54f5e3be0a49662e7760c958affe3304947acfb50890aa7

Malware Config

Targets

    • Target

      6eee80b7e7fd17c1b778b19ea770cef4

    • Size

      5.0MB

    • MD5

      6eee80b7e7fd17c1b778b19ea770cef4

    • SHA1

      038762f633fdf30aa2293480f3d3137836d9c4b1

    • SHA256

      2b5cbf5e13320559b9362865a4167d3a4fb2400a81529dd37e54344071a41ad9

    • SHA512

      a2147b6ca7f92831726b6944fdfcb9cd0b6dc7cb89132cac6eabea5a9d4d1e7f312eadd7c8d7784df54f5e3be0a49662e7760c958affe3304947acfb50890aa7

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3276) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (975) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks