General

  • Target

    b9e12bc0168687acdf76c2a181f9dc75

  • Size

    5.0MB

  • Sample

    220720-c3kylabfcq

  • MD5

    b9e12bc0168687acdf76c2a181f9dc75

  • SHA1

    7ff85635f260c4ab5bcd75efa11c622248aeef4b

  • SHA256

    e9451972c4bc48feb055a082a1baf0dac4a7e321fc24ebb38e97303d5e231ff7

  • SHA512

    102a665d2b09fcc9ef23717a621062d0f9449bcb58f661c2091a61eb9d32acdb55f5bcf0a2c0e541b5215a2cda310133dabd221943c941087a7c871488c3e0c7

Malware Config

Targets

    • Target

      b9e12bc0168687acdf76c2a181f9dc75

    • Size

      5.0MB

    • MD5

      b9e12bc0168687acdf76c2a181f9dc75

    • SHA1

      7ff85635f260c4ab5bcd75efa11c622248aeef4b

    • SHA256

      e9451972c4bc48feb055a082a1baf0dac4a7e321fc24ebb38e97303d5e231ff7

    • SHA512

      102a665d2b09fcc9ef23717a621062d0f9449bcb58f661c2091a61eb9d32acdb55f5bcf0a2c0e541b5215a2cda310133dabd221943c941087a7c871488c3e0c7

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3077) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (957) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks