General

  • Target

    b2115b4138ea487dd35e228c0061d67b

  • Size

    5.0MB

  • Sample

    220720-cnz4zaaeg9

  • MD5

    b2115b4138ea487dd35e228c0061d67b

  • SHA1

    036d4a4c13e47f76534487f1e1abc8e2edcbe942

  • SHA256

    2b24654e5faf1b0e1210478bdf8b5bf1770836fa4dab32994340beceb587b621

  • SHA512

    f9533fafe1da75b41e07b1953cdd0235ca9065a8964d6417cf86c2bac19beb1477d0cde2694745385d1eec4f3e0c379dc7e53fb8430b4dcabdc233cff18da4f3

Malware Config

Targets

    • Target

      b2115b4138ea487dd35e228c0061d67b

    • Size

      5.0MB

    • MD5

      b2115b4138ea487dd35e228c0061d67b

    • SHA1

      036d4a4c13e47f76534487f1e1abc8e2edcbe942

    • SHA256

      2b24654e5faf1b0e1210478bdf8b5bf1770836fa4dab32994340beceb587b621

    • SHA512

      f9533fafe1da75b41e07b1953cdd0235ca9065a8964d6417cf86c2bac19beb1477d0cde2694745385d1eec4f3e0c379dc7e53fb8430b4dcabdc233cff18da4f3

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3241) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1256) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks