General

  • Target

    c4cc252e2c08a9fe195af62e10cf6b6c

  • Size

    5.0MB

  • Sample

    220720-bs1qmaaah6

  • MD5

    c4cc252e2c08a9fe195af62e10cf6b6c

  • SHA1

    b96ac96be7460ae023dfe3bba345423f1cad2bd3

  • SHA256

    95a93ef50df18f72fcb79b3e640ec4f0bea20082d7ff85813ced6421464694e6

  • SHA512

    d0cbf7ea88499226250102d8909977840607a9ef5f3ea70556320541b32e6af829d29f0a668a29239c0ff09b300b5834ce47e4528b39aba3f4bb4c5e6d1da66e

Malware Config

Targets

    • Target

      c4cc252e2c08a9fe195af62e10cf6b6c

    • Size

      5.0MB

    • MD5

      c4cc252e2c08a9fe195af62e10cf6b6c

    • SHA1

      b96ac96be7460ae023dfe3bba345423f1cad2bd3

    • SHA256

      95a93ef50df18f72fcb79b3e640ec4f0bea20082d7ff85813ced6421464694e6

    • SHA512

      d0cbf7ea88499226250102d8909977840607a9ef5f3ea70556320541b32e6af829d29f0a668a29239c0ff09b300b5834ce47e4528b39aba3f4bb4c5e6d1da66e

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3119) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1230) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks