General

  • Target

    7835ea6ac1cd6702bb50ea57fd598716

  • Size

    5.0MB

  • Sample

    220720-bec3eahhg9

  • MD5

    7835ea6ac1cd6702bb50ea57fd598716

  • SHA1

    36aea0d627d0d7d2ee8d4d1ca931d4ea8cf290d8

  • SHA256

    580f6e9fdbfd5f1fbb439573dd21ef1b56ce227f66ad3c8364c3c553a04e6686

  • SHA512

    7feb8ea65efa5c9924ef17672880d31cc652d878e49ad3da3a4c29b4b79685e1d328072a9d32d6d2a7e3b734e2f3b231e287b7254e4d3d8ba020c9f2a556388f

Malware Config

Targets

    • Target

      7835ea6ac1cd6702bb50ea57fd598716

    • Size

      5.0MB

    • MD5

      7835ea6ac1cd6702bb50ea57fd598716

    • SHA1

      36aea0d627d0d7d2ee8d4d1ca931d4ea8cf290d8

    • SHA256

      580f6e9fdbfd5f1fbb439573dd21ef1b56ce227f66ad3c8364c3c553a04e6686

    • SHA512

      7feb8ea65efa5c9924ef17672880d31cc652d878e49ad3da3a4c29b4b79685e1d328072a9d32d6d2a7e3b734e2f3b231e287b7254e4d3d8ba020c9f2a556388f

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3211) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1190) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks