General

  • Target

    46f5d06f1ca33e107a9d70b1937fdbd4

  • Size

    3MB

  • Sample

    220908-yb4ghsfeg5

  • MD5

    46f5d06f1ca33e107a9d70b1937fdbd4

  • SHA1

    4f5d5eb603fe6bffe4fdedf9035da447822d51f7

  • SHA256

    34655064ada549dd770e56bf37110afb04b9b387f28b2f98ce8e3b1a7a821cdc

  • SHA512

    0ead60754e6bb44d66ea9976d143b719e74237f4f486488015d3875d2955f153f9efb584d18bd158ce34707b4f0824a0c05569e9773441153c569d201b585565

Malware Config

Targets

    • Target

      46f5d06f1ca33e107a9d70b1937fdbd4

    • Size

      3MB

    • MD5

      46f5d06f1ca33e107a9d70b1937fdbd4

    • SHA1

      4f5d5eb603fe6bffe4fdedf9035da447822d51f7

    • SHA256

      34655064ada549dd770e56bf37110afb04b9b387f28b2f98ce8e3b1a7a821cdc

    • SHA512

      0ead60754e6bb44d66ea9976d143b719e74237f4f486488015d3875d2955f153f9efb584d18bd158ce34707b4f0824a0c05569e9773441153c569d201b585565

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3104) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1278) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Persistence

                      Privilege Escalation