General

  • Target

    18b3ca6e1625516808e278a2e2a68d0e

  • Size

    5.0MB

  • Sample

    220720-c7k46abaf9

  • MD5

    18b3ca6e1625516808e278a2e2a68d0e

  • SHA1

    7f4b2045f9a2db1f19e97ef086db880de82b32de

  • SHA256

    a8c1904b9075519b6b375393c8f1a3beb2941d7bf6047e5d431e5532b4cf8f20

  • SHA512

    f98a56d8e404a95d013cf7cf808a44f9217928dcad9b39c99775bea655464291ada568ee41d5fc5fc048139647fcb6ed2b9b78c2133cc140402f56f6af4d8fe1

Malware Config

Targets

    • Target

      18b3ca6e1625516808e278a2e2a68d0e

    • Size

      5.0MB

    • MD5

      18b3ca6e1625516808e278a2e2a68d0e

    • SHA1

      7f4b2045f9a2db1f19e97ef086db880de82b32de

    • SHA256

      a8c1904b9075519b6b375393c8f1a3beb2941d7bf6047e5d431e5532b4cf8f20

    • SHA512

      f98a56d8e404a95d013cf7cf808a44f9217928dcad9b39c99775bea655464291ada568ee41d5fc5fc048139647fcb6ed2b9b78c2133cc140402f56f6af4d8fe1

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3115) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1218) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks