General

  • Target

    6ac6507b0b0b519d15e3724721675d0c

  • Size

    5.0MB

  • Sample

    220720-bph2eaaae6

  • MD5

    6ac6507b0b0b519d15e3724721675d0c

  • SHA1

    1c41949e4e84d84b7f827d3bf9ff0d5f154c195b

  • SHA256

    f7a244b2769935910f368021c1cb123f72b3822ab6a3f844e9169b1cf100da22

  • SHA512

    29d98c34e2543bcce8b3229afc8361cb9dff1f97076fd7c1e9f0ed4c95335d8c016c61e9b502d59969f956f071ed59b42a76931a3c2b59aedc26ba31aee55c07

Malware Config

Targets

    • Target

      6ac6507b0b0b519d15e3724721675d0c

    • Size

      5.0MB

    • MD5

      6ac6507b0b0b519d15e3724721675d0c

    • SHA1

      1c41949e4e84d84b7f827d3bf9ff0d5f154c195b

    • SHA256

      f7a244b2769935910f368021c1cb123f72b3822ab6a3f844e9169b1cf100da22

    • SHA512

      29d98c34e2543bcce8b3229afc8361cb9dff1f97076fd7c1e9f0ed4c95335d8c016c61e9b502d59969f956f071ed59b42a76931a3c2b59aedc26ba31aee55c07

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3212) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1226) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks