General

  • Target

    a25ce7c14a9352b35bd20c99c94b1b19

  • Size

    5.0MB

  • Sample

    220720-bxy3laafeq

  • MD5

    a25ce7c14a9352b35bd20c99c94b1b19

  • SHA1

    4eb044f3cf31b85dbb3136cf81535855b083ba74

  • SHA256

    7ab0e9ddbab262e9d049de139e13f3ef8caefc72336dc2ff6575bb49044385f5

  • SHA512

    2d768d7ef6c7b968a7eb66dc43f668b99a4a6d463514ff5d23586e02985a137ef9d0464d7d425e6117e29bffb3323de09ed3c4f8229adfb4c8f479e323507541

Malware Config

Targets

    • Target

      a25ce7c14a9352b35bd20c99c94b1b19

    • Size

      5.0MB

    • MD5

      a25ce7c14a9352b35bd20c99c94b1b19

    • SHA1

      4eb044f3cf31b85dbb3136cf81535855b083ba74

    • SHA256

      7ab0e9ddbab262e9d049de139e13f3ef8caefc72336dc2ff6575bb49044385f5

    • SHA512

      2d768d7ef6c7b968a7eb66dc43f668b99a4a6d463514ff5d23586e02985a137ef9d0464d7d425e6117e29bffb3323de09ed3c4f8229adfb4c8f479e323507541

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (2680) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (957) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks