General

  • Target

    a7aaf623771619d8fa6ad2f4cbe119d0

  • Size

    5.0MB

  • Sample

    220720-b9vkyaacb4

  • MD5

    a7aaf623771619d8fa6ad2f4cbe119d0

  • SHA1

    6fe61fd0720ce969d5c3067d9ac46c014548167e

  • SHA256

    55232d804aa5343e8247164b7d0b000ad5600437ab3a4314f35782e84abdeee5

  • SHA512

    4f8311f09539c4fc0b588e667d8b3b5a6f57f16eb1c7862c249aa15cecef7c53a26a6163cece97b5da6f4a21779939aa6a1bf533dd9959e4b58970c7aaa6517f

Malware Config

Targets

    • Target

      a7aaf623771619d8fa6ad2f4cbe119d0

    • Size

      5.0MB

    • MD5

      a7aaf623771619d8fa6ad2f4cbe119d0

    • SHA1

      6fe61fd0720ce969d5c3067d9ac46c014548167e

    • SHA256

      55232d804aa5343e8247164b7d0b000ad5600437ab3a4314f35782e84abdeee5

    • SHA512

      4f8311f09539c4fc0b588e667d8b3b5a6f57f16eb1c7862c249aa15cecef7c53a26a6163cece97b5da6f4a21779939aa6a1bf533dd9959e4b58970c7aaa6517f

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (2601) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1260) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks