Resubmissions

28-07-2024 07:07

240728-hxpmgsthmr 10

27-07-2024 18:52

240727-xh78lswhmg 10

29-05-2024 01:42

240529-b4pshaeb68 10

28-05-2024 03:12

240528-dqg7lsdg65 10

28-05-2024 03:08

240528-dnct4sdf86 10

28-05-2024 00:39

240528-az15ashb56 10

26-05-2024 05:03

240526-fp6vpagf79 3

26-05-2024 04:32

240526-e585bafg76 10

26-05-2024 04:29

240526-e4bgnaeh91 10

26-05-2024 04:26

240526-e2y5yaff38 4

Analysis

  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    26-05-2024 05:03

Errors

Reason
Payload did not run: insmod: cannot allocate memory payload error: fork/exec /tmp/WannaCry.exe: exec format error

General

  • Target

    WannaCry.exe

  • Size

    3.4MB

  • MD5

    84c82835a5d21bbcf75a61706d8ab549

  • SHA1

    5ff465afaabcbf0150d1a3ab2c2e74f3a4426467

  • SHA256

    ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa

  • SHA512

    90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244

  • SSDEEP

    98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3x:QqPe1Cxcxk3ZAEUadzR8yc4gB

Score
1/10

Malware Config

Signatures

Processes

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads