General

  • Target

    3797c9c2f8a09b948b72ae0267496e93

  • Size

    5.0MB

  • Sample

    220720-bxec7aabb6

  • MD5

    3797c9c2f8a09b948b72ae0267496e93

  • SHA1

    31becf765d42b6392738268dd2306b65e65c7ba1

  • SHA256

    84ac0e73d6980f73c61d410013af7fd3615ab730df2168b48a3323ae98c173d3

  • SHA512

    9629ce17170e29250ee9bd969264c49407dea271cf68228706b97f1b701b29d76b41637e42f5e938c935bdf33b4ae1c3067b2bcbb090f91f2eff1c43ce10079b

Malware Config

Targets

    • Target

      3797c9c2f8a09b948b72ae0267496e93

    • Size

      5.0MB

    • MD5

      3797c9c2f8a09b948b72ae0267496e93

    • SHA1

      31becf765d42b6392738268dd2306b65e65c7ba1

    • SHA256

      84ac0e73d6980f73c61d410013af7fd3615ab730df2168b48a3323ae98c173d3

    • SHA512

      9629ce17170e29250ee9bd969264c49407dea271cf68228706b97f1b701b29d76b41637e42f5e938c935bdf33b4ae1c3067b2bcbb090f91f2eff1c43ce10079b

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3298) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1270) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks