General

  • Target

    986b29f805c4036a4b17a2050e67aae6

  • Size

    5.0MB

  • Sample

    220720-dmbknabghq

  • MD5

    986b29f805c4036a4b17a2050e67aae6

  • SHA1

    9c9118edacd1103c5244dd8cb103e26ff5f4238c

  • SHA256

    5cc480c8869b3c6b9e319b6688ba7c7da41c1ca679a2582adccb3d28aded93e4

  • SHA512

    450683459e863a881f06d91ad63d4f130a9e43ae9d8c83907a4ccce5239579bba2cc123172c19362736d031b17ed1cea4ba24b7d696cf0f828f05684fdd43e1a

Malware Config

Targets

    • Target

      986b29f805c4036a4b17a2050e67aae6

    • Size

      5.0MB

    • MD5

      986b29f805c4036a4b17a2050e67aae6

    • SHA1

      9c9118edacd1103c5244dd8cb103e26ff5f4238c

    • SHA256

      5cc480c8869b3c6b9e319b6688ba7c7da41c1ca679a2582adccb3d28aded93e4

    • SHA512

      450683459e863a881f06d91ad63d4f130a9e43ae9d8c83907a4ccce5239579bba2cc123172c19362736d031b17ed1cea4ba24b7d696cf0f828f05684fdd43e1a

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3097) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1272) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks