General

  • Target

    dc8b8f9c21e7fd8cf6e2253fbc0a5cf1

  • Size

    3MB

  • Sample

    220908-yfx6asffd4

  • MD5

    dc8b8f9c21e7fd8cf6e2253fbc0a5cf1

  • SHA1

    4b180b7f6271b9dc320bf65bfa6cf0b62f1ae2ce

  • SHA256

    809d539257b48fd3b42a4d5a5a992f32938555415e806e49c6910abaa39e2151

  • SHA512

    5d27e3c019dc8ea9e6de4ae78121c7d9cf3b9766aca1a2fb3488e10551c2a35af095ba8b52188606f01c691d8bb4c17d4a2de86f3cfc28558c7f08d82e673c31

Malware Config

Targets

    • Target

      dc8b8f9c21e7fd8cf6e2253fbc0a5cf1

    • Size

      3MB

    • MD5

      dc8b8f9c21e7fd8cf6e2253fbc0a5cf1

    • SHA1

      4b180b7f6271b9dc320bf65bfa6cf0b62f1ae2ce

    • SHA256

      809d539257b48fd3b42a4d5a5a992f32938555415e806e49c6910abaa39e2151

    • SHA512

      5d27e3c019dc8ea9e6de4ae78121c7d9cf3b9766aca1a2fb3488e10551c2a35af095ba8b52188606f01c691d8bb4c17d4a2de86f3cfc28558c7f08d82e673c31

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3303) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1320) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Persistence

                      Privilege Escalation