General

  • Target

    3259b250e93b5050a27a6de5a92c2ce0

  • Size

    3MB

  • Sample

    220920-t8lkradgh9

  • MD5

    3259b250e93b5050a27a6de5a92c2ce0

  • SHA1

    a010bfdecd5bf99ab7e45fdd15b5d2937233e01f

  • SHA256

    74e59e259f327ebc2e616d449acfb97fbb43823dd368df95b12c5d23cd0c1e46

  • SHA512

    fb25b6ba459935ccda8772b4beaf47d0d016676d5fd210dc344e2ae20c7f573b9a374e7279d1ba358d30f85f1fa9728b3708369b6bdfe3efd764c6f38beb15f4

Malware Config

Targets

    • Target

      3259b250e93b5050a27a6de5a92c2ce0

    • Size

      3MB

    • MD5

      3259b250e93b5050a27a6de5a92c2ce0

    • SHA1

      a010bfdecd5bf99ab7e45fdd15b5d2937233e01f

    • SHA256

      74e59e259f327ebc2e616d449acfb97fbb43823dd368df95b12c5d23cd0c1e46

    • SHA512

      fb25b6ba459935ccda8772b4beaf47d0d016676d5fd210dc344e2ae20c7f573b9a374e7279d1ba358d30f85f1fa9728b3708369b6bdfe3efd764c6f38beb15f4

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3260) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1194) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Persistence

                      Privilege Escalation