General

  • Target

    2a45a7ed67aab07387c67c30b04396c5

  • Size

    5.0MB

  • Sample

    220720-dgq36abbe9

  • MD5

    2a45a7ed67aab07387c67c30b04396c5

  • SHA1

    99e879f8aa85ca4d1647ee14db1988d1fb026b76

  • SHA256

    a54dc9d2c7a0395fffce3e9385196abf4ff0694a8e22eb3e81f4656e8b4f91b5

  • SHA512

    6fbc2a1f071d6db7119673cbeb005fc7b265f20d90f554c02a8c79c7d6f172d6fbc0ab223168cca0f56bee58ca2216917717e9c6b2fa5af3abe2be9fdefee3bf

Malware Config

Targets

    • Target

      2a45a7ed67aab07387c67c30b04396c5

    • Size

      5.0MB

    • MD5

      2a45a7ed67aab07387c67c30b04396c5

    • SHA1

      99e879f8aa85ca4d1647ee14db1988d1fb026b76

    • SHA256

      a54dc9d2c7a0395fffce3e9385196abf4ff0694a8e22eb3e81f4656e8b4f91b5

    • SHA512

      6fbc2a1f071d6db7119673cbeb005fc7b265f20d90f554c02a8c79c7d6f172d6fbc0ab223168cca0f56bee58ca2216917717e9c6b2fa5af3abe2be9fdefee3bf

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3228) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1260) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks