General

  • Target

    4f57b58c0c42d0dfbf27b46b02637434

  • Size

    5.0MB

  • Sample

    220720-b6eqbaagdm

  • MD5

    4f57b58c0c42d0dfbf27b46b02637434

  • SHA1

    d0aac992276be7ec15af54481ce127bf5e05958f

  • SHA256

    1ce398fce3e08622711cb74eb06650dc6ef1d4df3bd928261cc4e5b627b7c7fe

  • SHA512

    be5632be64efd94281a41a08c0db3d1362abf4210a05c52e1cc2a61abc0ea59bff53211130fa66d7d952ae24721f1fc2978051c007809097b6055b9f6d407cd1

Malware Config

Targets

    • Target

      4f57b58c0c42d0dfbf27b46b02637434

    • Size

      5.0MB

    • MD5

      4f57b58c0c42d0dfbf27b46b02637434

    • SHA1

      d0aac992276be7ec15af54481ce127bf5e05958f

    • SHA256

      1ce398fce3e08622711cb74eb06650dc6ef1d4df3bd928261cc4e5b627b7c7fe

    • SHA512

      be5632be64efd94281a41a08c0db3d1362abf4210a05c52e1cc2a61abc0ea59bff53211130fa66d7d952ae24721f1fc2978051c007809097b6055b9f6d407cd1

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3141) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1203) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks