General

  • Target

    e1c0a9deb5cb9034a2acb5201cdcccf0

  • Size

    5.0MB

  • Sample

    220720-dsgnvsbhcq

  • MD5

    e1c0a9deb5cb9034a2acb5201cdcccf0

  • SHA1

    0f52a01b9e3356b3456d2ad53835d2f38575d321

  • SHA256

    6bd2a4b827fca97495f84003e0eeeaef927e331e79f16c321950c0d12e5d15e0

  • SHA512

    1139098c042cd845be9b5eb8cf1379bd722a65e067a7d53e6e8d95ff27894c223230fd8360b32f01736362043ca62a35ec54e79c173886816772ff548df5c96c

Malware Config

Targets

    • Target

      e1c0a9deb5cb9034a2acb5201cdcccf0

    • Size

      5.0MB

    • MD5

      e1c0a9deb5cb9034a2acb5201cdcccf0

    • SHA1

      0f52a01b9e3356b3456d2ad53835d2f38575d321

    • SHA256

      6bd2a4b827fca97495f84003e0eeeaef927e331e79f16c321950c0d12e5d15e0

    • SHA512

      1139098c042cd845be9b5eb8cf1379bd722a65e067a7d53e6e8d95ff27894c223230fd8360b32f01736362043ca62a35ec54e79c173886816772ff548df5c96c

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3237) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1208) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks