General

  • Target

    06a935e7f87cf2480e3fbc605c67bab7

  • Size

    5.0MB

  • Sample

    220720-bph2eaaae7

  • MD5

    06a935e7f87cf2480e3fbc605c67bab7

  • SHA1

    9a4099b70455c1665c905cf86388df9e058433a5

  • SHA256

    9a7fd407910092ac9920fc621865bbdd80f3385238834eb977812c664132618b

  • SHA512

    5d2add3b2855d6cae3fe7dfc1a611aa13897965d06aa86e955aa32f972b4c174691627251fd7145416b3d2462088bec5932e3a6687b878b4ed3f3f7966fd8f20

Malware Config

Targets

    • Target

      06a935e7f87cf2480e3fbc605c67bab7

    • Size

      5.0MB

    • MD5

      06a935e7f87cf2480e3fbc605c67bab7

    • SHA1

      9a4099b70455c1665c905cf86388df9e058433a5

    • SHA256

      9a7fd407910092ac9920fc621865bbdd80f3385238834eb977812c664132618b

    • SHA512

      5d2add3b2855d6cae3fe7dfc1a611aa13897965d06aa86e955aa32f972b4c174691627251fd7145416b3d2462088bec5932e3a6687b878b4ed3f3f7966fd8f20

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3350) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1280) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks