General

  • Target

    54abc6dbc947845d38762f53af7f2b16

  • Size

    5.0MB

  • Sample

    220720-cdvfqsacd9

  • MD5

    54abc6dbc947845d38762f53af7f2b16

  • SHA1

    7376d7444a05dc21177496f10d0194eaedd66771

  • SHA256

    4056238a615260bca116bd686070addc75a16a4c30ee20e805ffdec5c6df0cbb

  • SHA512

    d4237b9685c151998308b306974e2e10cc36be530e5f63fa6ef0b4a08181d7cf501813a4e743436f0123c4100416580d2797e46bca1cdf0ea5ae4dfbd2c169b7

Malware Config

Targets

    • Target

      54abc6dbc947845d38762f53af7f2b16

    • Size

      5.0MB

    • MD5

      54abc6dbc947845d38762f53af7f2b16

    • SHA1

      7376d7444a05dc21177496f10d0194eaedd66771

    • SHA256

      4056238a615260bca116bd686070addc75a16a4c30ee20e805ffdec5c6df0cbb

    • SHA512

      d4237b9685c151998308b306974e2e10cc36be530e5f63fa6ef0b4a08181d7cf501813a4e743436f0123c4100416580d2797e46bca1cdf0ea5ae4dfbd2c169b7

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3190) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1236) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks