General

  • Target

    9d2833555fc41bce3dace0a1b327102d

  • Size

    5.0MB

  • Sample

    220720-dwxjgsbcg4

  • MD5

    9d2833555fc41bce3dace0a1b327102d

  • SHA1

    1d6566dd33f8fed825e75f230155f2adb1a1e4d3

  • SHA256

    9782298315b127534cfb24720e76e4cc946f71a72126da11f9bcb738b94d6b49

  • SHA512

    3ce4ccead3e7de1c565c592e130f205dbddc380b66e7865442aea9400a17d8d52d435ed43aa4342badca26acb3bc42f27e9cecfa5207e781ad8e82a65b9d7c0c

Malware Config

Targets

    • Target

      9d2833555fc41bce3dace0a1b327102d

    • Size

      5.0MB

    • MD5

      9d2833555fc41bce3dace0a1b327102d

    • SHA1

      1d6566dd33f8fed825e75f230155f2adb1a1e4d3

    • SHA256

      9782298315b127534cfb24720e76e4cc946f71a72126da11f9bcb738b94d6b49

    • SHA512

      3ce4ccead3e7de1c565c592e130f205dbddc380b66e7865442aea9400a17d8d52d435ed43aa4342badca26acb3bc42f27e9cecfa5207e781ad8e82a65b9d7c0c

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3190) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1212) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks