General

  • Target

    4ba3d5e67d65dd85838c6460add04f93

  • Size

    5.0MB

  • Sample

    220720-cfj3saacf6

  • MD5

    4ba3d5e67d65dd85838c6460add04f93

  • SHA1

    d013ca251d3cb4db30aebb89b5d7a85ebfa4fb5a

  • SHA256

    5ccd9a6def2edff6c13c74d075317bf552305dbb889bd2953392171c6d768c7e

  • SHA512

    108e6a11873e8e1f0bc97a18d79a8ff0d64a370e8e80be270f20a6cc8796e1acefe46d7ce6cd8ae5aea280f5326d20446098ba9199511514287ccb7ed40680de

Malware Config

Targets

    • Target

      4ba3d5e67d65dd85838c6460add04f93

    • Size

      5.0MB

    • MD5

      4ba3d5e67d65dd85838c6460add04f93

    • SHA1

      d013ca251d3cb4db30aebb89b5d7a85ebfa4fb5a

    • SHA256

      5ccd9a6def2edff6c13c74d075317bf552305dbb889bd2953392171c6d768c7e

    • SHA512

      108e6a11873e8e1f0bc97a18d79a8ff0d64a370e8e80be270f20a6cc8796e1acefe46d7ce6cd8ae5aea280f5326d20446098ba9199511514287ccb7ed40680de

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3046) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1265) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks