General

  • Target

    WannaCry2.ex

  • Size

    5.0MB

  • Sample

    240325-wwnwfshh2z

  • MD5

    0805cb0e64e34711530c95e58e38c11f

  • SHA1

    69a8ba560ef1aad2b1bc7614c1de8ed22e19deb6

  • SHA256

    773186144282a63cc3502ad10a3d8fd781a6c83eaabf06de4369b4ef96d93178

  • SHA512

    92b54b1fdf484fe188659b40e14e40ce69a736ae7feb02cb8f165843a18a5d358bf76f7e383d6166961c90916563f308757b6e6ab47ac1c9da8007e33fa1ed1a

  • SSDEEP

    98304:1DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:1DqPe1Cxcxk3ZAEUadzR8yc4H

Malware Config

Targets

    • Target

      WannaCry2.ex

    • Size

      5.0MB

    • MD5

      0805cb0e64e34711530c95e58e38c11f

    • SHA1

      69a8ba560ef1aad2b1bc7614c1de8ed22e19deb6

    • SHA256

      773186144282a63cc3502ad10a3d8fd781a6c83eaabf06de4369b4ef96d93178

    • SHA512

      92b54b1fdf484fe188659b40e14e40ce69a736ae7feb02cb8f165843a18a5d358bf76f7e383d6166961c90916563f308757b6e6ab47ac1c9da8007e33fa1ed1a

    • SSDEEP

      98304:1DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:1DqPe1Cxcxk3ZAEUadzR8yc4H

    • Modifies firewall policy service

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3030) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks