General
-
Target
script.py
-
Size
2KB
-
Sample
240307-ndqckahh85
-
MD5
20c47b744102c4e654cab8f7b9bddedc
-
SHA1
e79109192e26a458f0e4cee1e820f89cc0391ab4
-
SHA256
e41d890c3392d9a545eb8da748bf6ad0e81c8ce9f75a13f266241223c2338a19
-
SHA512
9432a4712057d0023cbe7aee0ff5947268fb35c6300fd3b2e5de3699a382c9b20f512c8206ea99113e0335fdac67fa37d52584fc8e6de107ba7a5b771214a8fb
Static task
static1
Behavioral task
behavioral1
Sample
script.py
Resource
win11-20240221-en
Malware Config
Extracted
C:\Users\Admin\Desktop\WannaCry-main\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
script.py
-
Size
2KB
-
MD5
20c47b744102c4e654cab8f7b9bddedc
-
SHA1
e79109192e26a458f0e4cee1e820f89cc0391ab4
-
SHA256
e41d890c3392d9a545eb8da748bf6ad0e81c8ce9f75a13f266241223c2338a19
-
SHA512
9432a4712057d0023cbe7aee0ff5947268fb35c6300fd3b2e5de3699a382c9b20f512c8206ea99113e0335fdac67fa37d52584fc8e6de107ba7a5b771214a8fb
Score10/10-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-