General

  • Target

    e401c39e252447006bc3bd77077d654c

  • Size

    5.0MB

  • Sample

    220720-dlq9qabbh4

  • MD5

    e401c39e252447006bc3bd77077d654c

  • SHA1

    6b726234d696b4a99c8ba76173d5b58cdf045751

  • SHA256

    04dc3ef5506d881a29eab6815f250edd48ca853919a797e4a68bd92c65a3eb53

  • SHA512

    06ed4316249660332fd3bd64868495cb3a30cc2e3bfc714d09ae66758d090804bef6d6a22a21952f1e64d36395329f5ba2af71df4af7b828e10b958ca5f227d3

Malware Config

Targets

    • Target

      e401c39e252447006bc3bd77077d654c

    • Size

      5.0MB

    • MD5

      e401c39e252447006bc3bd77077d654c

    • SHA1

      6b726234d696b4a99c8ba76173d5b58cdf045751

    • SHA256

      04dc3ef5506d881a29eab6815f250edd48ca853919a797e4a68bd92c65a3eb53

    • SHA512

      06ed4316249660332fd3bd64868495cb3a30cc2e3bfc714d09ae66758d090804bef6d6a22a21952f1e64d36395329f5ba2af71df4af7b828e10b958ca5f227d3

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3275) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1323) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks