Resubmissions

21-12-2024 13:31

241221-qsc2wszqfs 10

21-12-2024 13:23

241221-qmx5wazphw 10

General

  • Target

    2024-12-21_3b1e6c1d2b8f29ef890672be8f013706_wannacry

  • Size

    5.0MB

  • Sample

    241221-qsc2wszqfs

  • MD5

    3b1e6c1d2b8f29ef890672be8f013706

  • SHA1

    1b3f55bba64074ae268857623844dc281ba9a7eb

  • SHA256

    13702eff58f50601c6d71543c97a8231766b8ea59158a877bfb80e4d818846fe

  • SHA512

    5bd53261b6eabe177189111c6b7607597d5936561ce502a31a539c28166f8cdd3ddb4d930f092928681547a6ddb8c148fa7f6fab31545031d8635e21e313c81b

  • SSDEEP

    12288:eQbLgmluyQhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DzUgZLHJ98kI:VbLguVQhfdmMSirYbcMNgef0yD8kI

Malware Config

Targets

    • Target

      2024-12-21_3b1e6c1d2b8f29ef890672be8f013706_wannacry

    • Size

      5.0MB

    • MD5

      3b1e6c1d2b8f29ef890672be8f013706

    • SHA1

      1b3f55bba64074ae268857623844dc281ba9a7eb

    • SHA256

      13702eff58f50601c6d71543c97a8231766b8ea59158a877bfb80e4d818846fe

    • SHA512

      5bd53261b6eabe177189111c6b7607597d5936561ce502a31a539c28166f8cdd3ddb4d930f092928681547a6ddb8c148fa7f6fab31545031d8635e21e313c81b

    • SSDEEP

      12288:eQbLgmluyQhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DzUgZLHJ98kI:VbLguVQhfdmMSirYbcMNgef0yD8kI

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Contacts a large (2526) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks