General

  • Target

    2024-12-14_c061f91eadf32cd6b92f01d9d4f76d45_wannacry

  • Size

    5.0MB

  • Sample

    241214-qhtlwsvler

  • MD5

    c061f91eadf32cd6b92f01d9d4f76d45

  • SHA1

    6a1f1ef6a3936f76c29eba7923c0be525437b458

  • SHA256

    1bf4f75102127fc9920a90682e2c4a24704266dcfefeee0955f80c7bdad66777

  • SHA512

    bddde3aed052259ff86571a4f5bb2c230efc6904a7fb781db32e0b200ef58e8b55a8f70f08ece1758dbd0311cff08382aa2ba96744b5886f58efe2877d418330

  • SSDEEP

    98304:qDqPoBK6SAEdhvxWa9P593R8yAVp2HAa9CUEbet:qDqPJZAEUadzR8yc4HAakUae

Malware Config

Targets

    • Target

      2024-12-14_c061f91eadf32cd6b92f01d9d4f76d45_wannacry

    • Size

      5.0MB

    • MD5

      c061f91eadf32cd6b92f01d9d4f76d45

    • SHA1

      6a1f1ef6a3936f76c29eba7923c0be525437b458

    • SHA256

      1bf4f75102127fc9920a90682e2c4a24704266dcfefeee0955f80c7bdad66777

    • SHA512

      bddde3aed052259ff86571a4f5bb2c230efc6904a7fb781db32e0b200ef58e8b55a8f70f08ece1758dbd0311cff08382aa2ba96744b5886f58efe2877d418330

    • SSDEEP

      98304:qDqPoBK6SAEdhvxWa9P593R8yAVp2HAa9CUEbet:qDqPJZAEUadzR8yc4HAakUae

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Contacts a large (3259) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks