General

  • Target

    aaa3cc4e9a44e2b818fdbdc7b237e448

  • Size

    5.0MB

  • Sample

    220720-bt4tnsaba4

  • MD5

    aaa3cc4e9a44e2b818fdbdc7b237e448

  • SHA1

    d6e52fa61b42df2c2089eeb851744bbd87cacd84

  • SHA256

    d079f3fcf18687fb745b25e5e4156f9d5e91ebb7bd5566782285a6685d96e1d6

  • SHA512

    1d4160f21a9de75e48c8b0b64885269385e1c0a3b2bee1d3af2307a3f51d0c4ef8dce86cb59b03544fed5f7c1db41203744c8946349da4ad3b2f831b36ad6c22

Malware Config

Targets

    • Target

      aaa3cc4e9a44e2b818fdbdc7b237e448

    • Size

      5.0MB

    • MD5

      aaa3cc4e9a44e2b818fdbdc7b237e448

    • SHA1

      d6e52fa61b42df2c2089eeb851744bbd87cacd84

    • SHA256

      d079f3fcf18687fb745b25e5e4156f9d5e91ebb7bd5566782285a6685d96e1d6

    • SHA512

      1d4160f21a9de75e48c8b0b64885269385e1c0a3b2bee1d3af2307a3f51d0c4ef8dce86cb59b03544fed5f7c1db41203744c8946349da4ad3b2f831b36ad6c22

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3067) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1298) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks