General

  • Target

    e094e4a8ec58eaa7eefe454584abd195

  • Size

    5.0MB

  • Sample

    220720-cjemgaada9

  • MD5

    e094e4a8ec58eaa7eefe454584abd195

  • SHA1

    c2567e5b7dcc8f96b5f2d7957f0af7fea90ebd62

  • SHA256

    357e6d6022b3316f7859567b079785dd53bff98f08420e94411393ea86c27ab1

  • SHA512

    47596fdddd8ce116aff4e38e7bba228c214c1ef1469ff013acce497e1a3c54a56a64103812421f47185b9dc5e34b895e8ec0b6c96272e3bee808041ce45a6da8

Malware Config

Targets

    • Target

      e094e4a8ec58eaa7eefe454584abd195

    • Size

      5.0MB

    • MD5

      e094e4a8ec58eaa7eefe454584abd195

    • SHA1

      c2567e5b7dcc8f96b5f2d7957f0af7fea90ebd62

    • SHA256

      357e6d6022b3316f7859567b079785dd53bff98f08420e94411393ea86c27ab1

    • SHA512

      47596fdddd8ce116aff4e38e7bba228c214c1ef1469ff013acce497e1a3c54a56a64103812421f47185b9dc5e34b895e8ec0b6c96272e3bee808041ce45a6da8

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3175) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (726) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks