General

  • Target

    eabf61ab167036bf6e32f50b1d10a51d

  • Size

    5.0MB

  • Sample

    220720-de2f4sbgdk

  • MD5

    eabf61ab167036bf6e32f50b1d10a51d

  • SHA1

    add487c25487367c3a403226c5551660ae8e920a

  • SHA256

    9dff446dd66f69115dda623bcb49e0a1b9783e3de4e57ab4c48d321ff316434c

  • SHA512

    fea2744c57963cbd84646c0446d2321e6d76c85c6d5c055c1f7ed1faf656027fa1f6ac0ae8f0b02580d31ab79103cabd86f30ea753a2e58039f85384e4401497

Malware Config

Targets

    • Target

      eabf61ab167036bf6e32f50b1d10a51d

    • Size

      5.0MB

    • MD5

      eabf61ab167036bf6e32f50b1d10a51d

    • SHA1

      add487c25487367c3a403226c5551660ae8e920a

    • SHA256

      9dff446dd66f69115dda623bcb49e0a1b9783e3de4e57ab4c48d321ff316434c

    • SHA512

      fea2744c57963cbd84646c0446d2321e6d76c85c6d5c055c1f7ed1faf656027fa1f6ac0ae8f0b02580d31ab79103cabd86f30ea753a2e58039f85384e4401497

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (2656) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1273) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks