General

  • Target

    b887463c269ff3eefc056cf97c86c14c

  • Size

    3MB

  • Sample

    220920-vkggkaheeq

  • MD5

    b887463c269ff3eefc056cf97c86c14c

  • SHA1

    0420b2b9b16639203db74479eb50ba4a62fe97e9

  • SHA256

    c7a80ee28fd55ed45ccafeb34d5e3922016d5e3a8a6abd5cdf40f65968719cdf

  • SHA512

    1517ea2a8ad21ed2b7298677741ce84a3b7b3073f1bcb0a5cdd125089f118cc9fcdf51ad9f0f3d64f0372f7f1930e76cbafaa064f09fa0d07a6ded03bc4965cb

Malware Config

Targets

    • Target

      b887463c269ff3eefc056cf97c86c14c

    • Size

      3MB

    • MD5

      b887463c269ff3eefc056cf97c86c14c

    • SHA1

      0420b2b9b16639203db74479eb50ba4a62fe97e9

    • SHA256

      c7a80ee28fd55ed45ccafeb34d5e3922016d5e3a8a6abd5cdf40f65968719cdf

    • SHA512

      1517ea2a8ad21ed2b7298677741ce84a3b7b3073f1bcb0a5cdd125089f118cc9fcdf51ad9f0f3d64f0372f7f1930e76cbafaa064f09fa0d07a6ded03bc4965cb

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3184) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1203) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Persistence

                      Privilege Escalation