General

  • Target

    50a4daa7e9c1fc8a4b62457f9d7538c9

  • Size

    5.0MB

  • Sample

    220720-b6eejsagdl

  • MD5

    50a4daa7e9c1fc8a4b62457f9d7538c9

  • SHA1

    e2ab9e97df6457e299155213b88f53c22d55c6c4

  • SHA256

    a917952029deb1a0e3492291a08303bfd0da6f93480bb1da9a878b15e609bfc7

  • SHA512

    cda68bb356406414ee36534b0fb7c4a18919dbee9d489a5437c7b9f3bf32350df1bc08418a91181461ced9b99517715d104e46dc5f2f4c3b2e4408bb393ebbf4

Malware Config

Targets

    • Target

      50a4daa7e9c1fc8a4b62457f9d7538c9

    • Size

      5.0MB

    • MD5

      50a4daa7e9c1fc8a4b62457f9d7538c9

    • SHA1

      e2ab9e97df6457e299155213b88f53c22d55c6c4

    • SHA256

      a917952029deb1a0e3492291a08303bfd0da6f93480bb1da9a878b15e609bfc7

    • SHA512

      cda68bb356406414ee36534b0fb7c4a18919dbee9d489a5437c7b9f3bf32350df1bc08418a91181461ced9b99517715d104e46dc5f2f4c3b2e4408bb393ebbf4

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3213) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1190) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks