General

  • Target

    833673f1109f028b77a5703bdd180bda

  • Size

    5.0MB

  • Sample

    220720-dtlzzabhdp

  • MD5

    833673f1109f028b77a5703bdd180bda

  • SHA1

    c182af79cac9592bb4b4bbe5f507e70fe98e08ca

  • SHA256

    9bfd0ee288665f94b99c0bea0d7bdc55521fa761a2a8e0390481bf3a3f210cf7

  • SHA512

    29eda75865243498b123c7fe5c6b7b3bba40e5838dc41b27fabaa6b3c52bf81f824da3a51ece3ba5a978ca3e3b540c027cadec769d418d37104800f164908c24

Malware Config

Targets

    • Target

      833673f1109f028b77a5703bdd180bda

    • Size

      5.0MB

    • MD5

      833673f1109f028b77a5703bdd180bda

    • SHA1

      c182af79cac9592bb4b4bbe5f507e70fe98e08ca

    • SHA256

      9bfd0ee288665f94b99c0bea0d7bdc55521fa761a2a8e0390481bf3a3f210cf7

    • SHA512

      29eda75865243498b123c7fe5c6b7b3bba40e5838dc41b27fabaa6b3c52bf81f824da3a51ece3ba5a978ca3e3b540c027cadec769d418d37104800f164908c24

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3184) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1254) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

3
T1046

Tasks