General

  • Target

    c0c6cdd528c438532fe16b19c5302bf5

  • Size

    5.0MB

  • Sample

    220720-b4pgqsagbk

  • MD5

    c0c6cdd528c438532fe16b19c5302bf5

  • SHA1

    2cda06ec3ed843e1c5778a91b8a2a3c1740f1a0e

  • SHA256

    7632930b27dfc20a2bd82a937b3dbf3edd5d8108c14f7fc9d083d5476a4b3fa0

  • SHA512

    9f5abda38300187b723ca90e113068f16f0a4b0ee1d0b00de0c6211ee339f2802883284b74f3755f64480e1c71fe01b58fb5e7009c094774fa2577983d67c301

Malware Config

Targets

    • Target

      c0c6cdd528c438532fe16b19c5302bf5

    • Size

      5.0MB

    • MD5

      c0c6cdd528c438532fe16b19c5302bf5

    • SHA1

      2cda06ec3ed843e1c5778a91b8a2a3c1740f1a0e

    • SHA256

      7632930b27dfc20a2bd82a937b3dbf3edd5d8108c14f7fc9d083d5476a4b3fa0

    • SHA512

      9f5abda38300187b723ca90e113068f16f0a4b0ee1d0b00de0c6211ee339f2802883284b74f3755f64480e1c71fe01b58fb5e7009c094774fa2577983d67c301

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3174) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1197) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks