General

  • Target

    24ad1977f214cd1c59c4f3139cb4acf6

  • Size

    5.0MB

  • Sample

    220720-bg8l4aaecl

  • MD5

    24ad1977f214cd1c59c4f3139cb4acf6

  • SHA1

    6dc758c9ab7ffd729eb03ab37e6be8c200997398

  • SHA256

    5e1ed6dce864564ca3e35e411a9ac6573d649313f5fbb388bbbaba0ee65b8c34

  • SHA512

    8c06ca0ed666b8814286b26509d025c5fdaadb271295cd220f568a2aceb8240b8723b6913a8344d1d89f9d8d67cc0b2ab1b849e67c998d330b9be910cad2628b

Malware Config

Targets

    • Target

      24ad1977f214cd1c59c4f3139cb4acf6

    • Size

      5.0MB

    • MD5

      24ad1977f214cd1c59c4f3139cb4acf6

    • SHA1

      6dc758c9ab7ffd729eb03ab37e6be8c200997398

    • SHA256

      5e1ed6dce864564ca3e35e411a9ac6573d649313f5fbb388bbbaba0ee65b8c34

    • SHA512

      8c06ca0ed666b8814286b26509d025c5fdaadb271295cd220f568a2aceb8240b8723b6913a8344d1d89f9d8d67cc0b2ab1b849e67c998d330b9be910cad2628b

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3092) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1261) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks