General

  • Target

    40c9ec5ae37cbff719a72b17ffa041a6

  • Size

    5.0MB

  • Sample

    220720-bc8fjaadgr

  • MD5

    40c9ec5ae37cbff719a72b17ffa041a6

  • SHA1

    c392adcbcd3c2927f2adbf6471fa587660f85455

  • SHA256

    c80aa7f36932a3e07d8690002788a6a965ab72726fbb96012a2233f022ab41f7

  • SHA512

    c2edf1a3c9402dea549f5236395bbe12f3c7a95ba8f141800dc1cfd457257ceb3b46049ab4dd69517c95994661a38391c4a93e92c43b5b9131bd1dcb50a1c879

Malware Config

Targets

    • Target

      40c9ec5ae37cbff719a72b17ffa041a6

    • Size

      5.0MB

    • MD5

      40c9ec5ae37cbff719a72b17ffa041a6

    • SHA1

      c392adcbcd3c2927f2adbf6471fa587660f85455

    • SHA256

      c80aa7f36932a3e07d8690002788a6a965ab72726fbb96012a2233f022ab41f7

    • SHA512

      c2edf1a3c9402dea549f5236395bbe12f3c7a95ba8f141800dc1cfd457257ceb3b46049ab4dd69517c95994661a38391c4a93e92c43b5b9131bd1dcb50a1c879

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3013) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1220) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks