General

  • Target

    96c38c610cb5481fb203ccdc5d2a8c04

  • Size

    5.0MB

  • Sample

    220720-bfjataaeaq

  • MD5

    96c38c610cb5481fb203ccdc5d2a8c04

  • SHA1

    e9ff5b14a5630debcd7fc367ebf8977c8901d86a

  • SHA256

    436ca8f98e46b156c90668527380546079a1c6dd72d7e433c253f43f0f2481e0

  • SHA512

    771f744e2c73c7495d5d3fc12bd63ac76a0727dc6c6d447aaea8d4fd1c3047a629a070b7625bb697b1b49f90f3d677af956b753034df5d08a1901c66bce4f74b

Malware Config

Targets

    • Target

      96c38c610cb5481fb203ccdc5d2a8c04

    • Size

      5.0MB

    • MD5

      96c38c610cb5481fb203ccdc5d2a8c04

    • SHA1

      e9ff5b14a5630debcd7fc367ebf8977c8901d86a

    • SHA256

      436ca8f98e46b156c90668527380546079a1c6dd72d7e433c253f43f0f2481e0

    • SHA512

      771f744e2c73c7495d5d3fc12bd63ac76a0727dc6c6d447aaea8d4fd1c3047a629a070b7625bb697b1b49f90f3d677af956b753034df5d08a1901c66bce4f74b

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3277) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1280) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks