General

  • Target

    13f8d4f3097e98c843e9a594b7a9c128

  • Size

    5.0MB

  • Sample

    220720-dvrxlsbcf4

  • MD5

    13f8d4f3097e98c843e9a594b7a9c128

  • SHA1

    a808002fdd82d43a7c828ba501880a13e739c512

  • SHA256

    1d18c87cdc79ab31f7213ebbe9366fbc94a8d2632fda53531680b1b9eccd109d

  • SHA512

    782362654e5239fbfd927c415831049024839480e9e2a1f22e589d60a7b686a19be81e1875a6538d6d22886c53752db8abd13c549a09a3b7728eb8ade76eba6d

Malware Config

Targets

    • Target

      13f8d4f3097e98c843e9a594b7a9c128

    • Size

      5.0MB

    • MD5

      13f8d4f3097e98c843e9a594b7a9c128

    • SHA1

      a808002fdd82d43a7c828ba501880a13e739c512

    • SHA256

      1d18c87cdc79ab31f7213ebbe9366fbc94a8d2632fda53531680b1b9eccd109d

    • SHA512

      782362654e5239fbfd927c415831049024839480e9e2a1f22e589d60a7b686a19be81e1875a6538d6d22886c53752db8abd13c549a09a3b7728eb8ade76eba6d

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (1278) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

1
T1046

Tasks