General

  • Target

    31d084e2b1846efa6aa8c48e0c15479c

  • Size

    5.0MB

  • Sample

    220720-ccptvsaghk

  • MD5

    31d084e2b1846efa6aa8c48e0c15479c

  • SHA1

    9ae7b8f7154dc52b7913a6cc10fe4ecf60fbef7f

  • SHA256

    b06b073d7b7686ccb923fe60231758fb74ab56b053aeb0d6c4b546fcaac8dae8

  • SHA512

    90143e5a66bd6caf8bfe64f6bdcd7e257522953299af4194dc1703cd2bdc568e092d78e0cf8ac5f0509cd08e29e04ad6eea57b32d29ed5a75b3f5c9da59f825a

Malware Config

Targets

    • Target

      31d084e2b1846efa6aa8c48e0c15479c

    • Size

      5.0MB

    • MD5

      31d084e2b1846efa6aa8c48e0c15479c

    • SHA1

      9ae7b8f7154dc52b7913a6cc10fe4ecf60fbef7f

    • SHA256

      b06b073d7b7686ccb923fe60231758fb74ab56b053aeb0d6c4b546fcaac8dae8

    • SHA512

      90143e5a66bd6caf8bfe64f6bdcd7e257522953299af4194dc1703cd2bdc568e092d78e0cf8ac5f0509cd08e29e04ad6eea57b32d29ed5a75b3f5c9da59f825a

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3139) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (986) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks