General

  • Target

    da6ac5326498e7dfef73b0a8cf99a409

  • Size

    5.0MB

  • Sample

    220720-by5lrsaffp

  • MD5

    da6ac5326498e7dfef73b0a8cf99a409

  • SHA1

    d12a2d7f96c1a7448940332c94f537ecc9de59e1

  • SHA256

    f5d6e57c830007ae7acd9e604aa6e1e1f6a3d1fe834c6e680f2aa18c0fef9cac

  • SHA512

    d424bcb389c98d8985dd7f504cfe33cf4ac566aca2ed91376088f7d3d8c631f21031bbf74776c5d628f89528a6a2cb5a14785627b681ead39dccccb28d968ed2

Malware Config

Targets

    • Target

      da6ac5326498e7dfef73b0a8cf99a409

    • Size

      5.0MB

    • MD5

      da6ac5326498e7dfef73b0a8cf99a409

    • SHA1

      d12a2d7f96c1a7448940332c94f537ecc9de59e1

    • SHA256

      f5d6e57c830007ae7acd9e604aa6e1e1f6a3d1fe834c6e680f2aa18c0fef9cac

    • SHA512

      d424bcb389c98d8985dd7f504cfe33cf4ac566aca2ed91376088f7d3d8c631f21031bbf74776c5d628f89528a6a2cb5a14785627b681ead39dccccb28d968ed2

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3140) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1258) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks