General

  • Target

    f5f5f4b69903ead601696df4279fcfb5

  • Size

    5.0MB

  • Sample

    220720-b89y8sager

  • MD5

    f5f5f4b69903ead601696df4279fcfb5

  • SHA1

    c20ccce59868c3b7bc5c2e291740b1b6659f95ed

  • SHA256

    a68dbf03faf318b6b4c599e2b9d3da00703b2668c5dc22f3262a3effdc38f580

  • SHA512

    73aa9f8005f36caeed4cf4490bb38a2b7d10a0755f05ee01c127dad3bf37fd1dc594c7ca8908e5fe6d62d27a5db7f166c0d1249d979c6bc3c114867f3ddb87ee

Malware Config

Targets

    • Target

      f5f5f4b69903ead601696df4279fcfb5

    • Size

      5.0MB

    • MD5

      f5f5f4b69903ead601696df4279fcfb5

    • SHA1

      c20ccce59868c3b7bc5c2e291740b1b6659f95ed

    • SHA256

      a68dbf03faf318b6b4c599e2b9d3da00703b2668c5dc22f3262a3effdc38f580

    • SHA512

      73aa9f8005f36caeed4cf4490bb38a2b7d10a0755f05ee01c127dad3bf37fd1dc594c7ca8908e5fe6d62d27a5db7f166c0d1249d979c6bc3c114867f3ddb87ee

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3201) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1553) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks