General

  • Target

    58b38e38995dd82b340de1d5380dce3e

  • Size

    5.0MB

  • Sample

    220720-dlq9qabghk

  • MD5

    58b38e38995dd82b340de1d5380dce3e

  • SHA1

    5dbb27635740c905d01cd14a604688387837dc7c

  • SHA256

    69d11b63913d84025f1469123b83bb21066a274f2240f87e119f49362abbc9ca

  • SHA512

    6fb641ce5871dd7939df1bf95617f0fba74b8caff03f12c37e281d61fc5ce42d2664c232baafbc91e28df75953de9154acaaba271a2598eae9cb702f2a7c2ed6

Malware Config

Targets

    • Target

      58b38e38995dd82b340de1d5380dce3e

    • Size

      5.0MB

    • MD5

      58b38e38995dd82b340de1d5380dce3e

    • SHA1

      5dbb27635740c905d01cd14a604688387837dc7c

    • SHA256

      69d11b63913d84025f1469123b83bb21066a274f2240f87e119f49362abbc9ca

    • SHA512

      6fb641ce5871dd7939df1bf95617f0fba74b8caff03f12c37e281d61fc5ce42d2664c232baafbc91e28df75953de9154acaaba271a2598eae9cb702f2a7c2ed6

    • Modifies firewall policy service

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3278) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1003) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Discovery

Network Service Scanning

3
T1046

Tasks