General

  • Target

    937d1c7c2a656bccc8a115f445b166db

  • Size

    5.0MB

  • Sample

    220720-bk4gjsaeeq

  • MD5

    937d1c7c2a656bccc8a115f445b166db

  • SHA1

    a20b4e933772ca65117992bdd60220726e9d545a

  • SHA256

    039b32d60d25dea0656c75fcc4017898a780560966b3a2915ca0e0c4220d4431

  • SHA512

    cbeea4b9e06c90514da3a98f7c16a72144ca93ec3b4bbd7a01c7a4bf181868803aeb5dd221698e8493f671fbaf1690ecc2543b85e2272bf83753b70bd124c610

Malware Config

Targets

    • Target

      937d1c7c2a656bccc8a115f445b166db

    • Size

      5.0MB

    • MD5

      937d1c7c2a656bccc8a115f445b166db

    • SHA1

      a20b4e933772ca65117992bdd60220726e9d545a

    • SHA256

      039b32d60d25dea0656c75fcc4017898a780560966b3a2915ca0e0c4220d4431

    • SHA512

      cbeea4b9e06c90514da3a98f7c16a72144ca93ec3b4bbd7a01c7a4bf181868803aeb5dd221698e8493f671fbaf1690ecc2543b85e2272bf83753b70bd124c610

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3324) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (996) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks