General

  • Target

    b12ae9ed4b33c4dcff12b16c64a8b8c3

  • Size

    5.0MB

  • Sample

    220720-bmt1wsaefp

  • MD5

    b12ae9ed4b33c4dcff12b16c64a8b8c3

  • SHA1

    8117bccc6a6361565660f8fbfb459cb35402647e

  • SHA256

    f3556ad1ba65d37716611a9e5878235ce20adcc41d7d99157fbb735098a95449

  • SHA512

    4efb484a564ba530a0702bbb7fc6a24093d6079d71cf5e110cb8f174bde12bc93a57be0ccb40f6e2f1f01cea3d9d548b59ff1500be701e859f9b820854017ff8

Malware Config

Targets

    • Target

      b12ae9ed4b33c4dcff12b16c64a8b8c3

    • Size

      5.0MB

    • MD5

      b12ae9ed4b33c4dcff12b16c64a8b8c3

    • SHA1

      8117bccc6a6361565660f8fbfb459cb35402647e

    • SHA256

      f3556ad1ba65d37716611a9e5878235ce20adcc41d7d99157fbb735098a95449

    • SHA512

      4efb484a564ba530a0702bbb7fc6a24093d6079d71cf5e110cb8f174bde12bc93a57be0ccb40f6e2f1f01cea3d9d548b59ff1500be701e859f9b820854017ff8

    • Modifies firewall policy service

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3012) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1270) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks