General

  • Target

    538182cd64e9b5d8c5e4b78d990a6b75f1b56b8a2dbc1bcaa3bee7bf59e5a786

  • Size

    5.0MB

  • Sample

    240531-1mdrcaee2s

  • MD5

    7c0ada776091154a2cb1015bcac66d65

  • SHA1

    14b85e1558e891542fcc3fd71e2ab2068537112b

  • SHA256

    538182cd64e9b5d8c5e4b78d990a6b75f1b56b8a2dbc1bcaa3bee7bf59e5a786

  • SHA512

    1ced5f1536b4fd61b49dfb16e3eca0777f8b1c7387a4ecc1de889027ae219c507f1d6a4ad921496352a6a09f1c616338fbcd7636a203e6c6489b019400d1965b

  • SSDEEP

    98304:8DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:8DqPe1Cxcxk3ZAEUadzR8yc4H

Malware Config

Targets

    • Target

      538182cd64e9b5d8c5e4b78d990a6b75f1b56b8a2dbc1bcaa3bee7bf59e5a786

    • Size

      5.0MB

    • MD5

      7c0ada776091154a2cb1015bcac66d65

    • SHA1

      14b85e1558e891542fcc3fd71e2ab2068537112b

    • SHA256

      538182cd64e9b5d8c5e4b78d990a6b75f1b56b8a2dbc1bcaa3bee7bf59e5a786

    • SHA512

      1ced5f1536b4fd61b49dfb16e3eca0777f8b1c7387a4ecc1de889027ae219c507f1d6a4ad921496352a6a09f1c616338fbcd7636a203e6c6489b019400d1965b

    • SSDEEP

      98304:8DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:8DqPe1Cxcxk3ZAEUadzR8yc4H

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3313) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • UPX dump on OEP (original entry point)

    • Modifies AppInit DLL entries

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks