General

  • Target

    0ab9a60a55cb40fc338e8f4988feee2f

  • Size

    5.0MB

  • Sample

    220720-dklmvabggn

  • MD5

    0ab9a60a55cb40fc338e8f4988feee2f

  • SHA1

    40b02f6f1d79200e8c2cca3123f08994b06cc0cf

  • SHA256

    8fb8affd012c7c103942c3c544ca7a2e31375428bb6cd17fbd49a6be08e47103

  • SHA512

    ccf39f7923768037e823a5f3ddfc0895bb244c35a39d5199cbcd6a830e1544c56e3aa322cf7ede0fa8332ce6925a01755c9e1606dddb308c5e6f63b855e2ae11

Malware Config

Targets

    • Target

      0ab9a60a55cb40fc338e8f4988feee2f

    • Size

      5.0MB

    • MD5

      0ab9a60a55cb40fc338e8f4988feee2f

    • SHA1

      40b02f6f1d79200e8c2cca3123f08994b06cc0cf

    • SHA256

      8fb8affd012c7c103942c3c544ca7a2e31375428bb6cd17fbd49a6be08e47103

    • SHA512

      ccf39f7923768037e823a5f3ddfc0895bb244c35a39d5199cbcd6a830e1544c56e3aa322cf7ede0fa8332ce6925a01755c9e1606dddb308c5e6f63b855e2ae11

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3208) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1292) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks