General

  • Target

    13c48f1c0755effc4376bfa52f387d3c

  • Size

    2MB

  • Sample

    220908-yjpy4afff5

  • MD5

    13c48f1c0755effc4376bfa52f387d3c

  • SHA1

    0ac1498a610347334450f1918bab617579914612

  • SHA256

    1b519d3c9e1032164f405a499e5bab8bb1679b8ef545c910ef967c4961148edd

  • SHA512

    447867c298fc7b02c7fdfdaaa3e15ae1b9aa7c924ebf07d8567c4b5c18ecd16f9303c7e1c24e9521381f5f0027c40552bcaf7c5497d53395b830ecbce529e9ad

Malware Config

Targets

    • Target

      13c48f1c0755effc4376bfa52f387d3c

    • Size

      2MB

    • MD5

      13c48f1c0755effc4376bfa52f387d3c

    • SHA1

      0ac1498a610347334450f1918bab617579914612

    • SHA256

      1b519d3c9e1032164f405a499e5bab8bb1679b8ef545c910ef967c4961148edd

    • SHA512

      447867c298fc7b02c7fdfdaaa3e15ae1b9aa7c924ebf07d8567c4b5c18ecd16f9303c7e1c24e9521381f5f0027c40552bcaf7c5497d53395b830ecbce529e9ad

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3206) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1299) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Persistence

                      Privilege Escalation