General

  • Target

    14f964c2a20d1e25ffc3457367909b76

  • Size

    5.0MB

  • Sample

    220720-dp7e4sbcb6

  • MD5

    14f964c2a20d1e25ffc3457367909b76

  • SHA1

    38095333280b2976026866ee9efd050cb1646b94

  • SHA256

    8984534b84ac860b4f2a8e99a6fe911b22cc21320ba1bb0c5a1bb1fd1d52bea1

  • SHA512

    e28c163a09be95d29fe126b4f3bd393b60c52e70400180479fd4c1551fcaf47a366e4a4a158979504431d60b3300285b8c2574d23742515aec7b6c7ff9871f91

Malware Config

Targets

    • Target

      14f964c2a20d1e25ffc3457367909b76

    • Size

      5.0MB

    • MD5

      14f964c2a20d1e25ffc3457367909b76

    • SHA1

      38095333280b2976026866ee9efd050cb1646b94

    • SHA256

      8984534b84ac860b4f2a8e99a6fe911b22cc21320ba1bb0c5a1bb1fd1d52bea1

    • SHA512

      e28c163a09be95d29fe126b4f3bd393b60c52e70400180479fd4c1551fcaf47a366e4a4a158979504431d60b3300285b8c2574d23742515aec7b6c7ff9871f91

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (2671) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1310) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks