General

  • Target

    f53f74e15b812d9e70ee3f12e040a683

  • Size

    5.0MB

  • Sample

    220720-h6nfsadaf6

  • MD5

    f53f74e15b812d9e70ee3f12e040a683

  • SHA1

    c937e539654c126c757366677d0ade39ee98cb5a

  • SHA256

    03b929c783fd24b331ee99cdeb3c5478d6943a99cbffba64b8fa98a809b0fadc

  • SHA512

    42a262b07199680faefb2bff063a0f9573289507f5098ffec616f0d739cb3d35fe09312345f15bc5c483394cd34912d8d39349449c07054a93401404c59e4e42

Malware Config

Targets

    • Target

      f53f74e15b812d9e70ee3f12e040a683

    • Size

      5.0MB

    • MD5

      f53f74e15b812d9e70ee3f12e040a683

    • SHA1

      c937e539654c126c757366677d0ade39ee98cb5a

    • SHA256

      03b929c783fd24b331ee99cdeb3c5478d6943a99cbffba64b8fa98a809b0fadc

    • SHA512

      42a262b07199680faefb2bff063a0f9573289507f5098ffec616f0d739cb3d35fe09312345f15bc5c483394cd34912d8d39349449c07054a93401404c59e4e42

    • Modifies firewall policy service

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3289) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1252) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks