General

  • Target

    6f29a203db474387de92d49a331325ab

  • Size

    5.0MB

  • Sample

    220720-dnghasbca5

  • MD5

    6f29a203db474387de92d49a331325ab

  • SHA1

    6cd0bfb71185d3f1f5418914544be86d176014bf

  • SHA256

    60b39d34b2089438db05f612a11f09e14fea05317ca2b4eb4f992b5be4d61103

  • SHA512

    e5dbd692b871947114a4616bff2665b77e8620b80c8a61f2809b1735d6897c7e59a832f5add5b3dee7b209a98a34f8ea704b019941f2249d87980d7e51d7646d

Malware Config

Targets

    • Target

      6f29a203db474387de92d49a331325ab

    • Size

      5.0MB

    • MD5

      6f29a203db474387de92d49a331325ab

    • SHA1

      6cd0bfb71185d3f1f5418914544be86d176014bf

    • SHA256

      60b39d34b2089438db05f612a11f09e14fea05317ca2b4eb4f992b5be4d61103

    • SHA512

      e5dbd692b871947114a4616bff2665b77e8620b80c8a61f2809b1735d6897c7e59a832f5add5b3dee7b209a98a34f8ea704b019941f2249d87980d7e51d7646d

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3240) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1256) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks