General

  • Target

    2025-01-13_2b2d4c951bf03fda3c69510592ed5570_wannacry

  • Size

    4.1MB

  • Sample

    250113-rwce7sxnaq

  • MD5

    2b2d4c951bf03fda3c69510592ed5570

  • SHA1

    3c90652b4dd4f84bdcb31edc32c58a24c7c5ea45

  • SHA256

    c484d410fa1fc64f6e86e9fa9952dfee5854fc68df6fee46bd1696f72703d453

  • SHA512

    9945a6e595714a0a2b774d34725383870ab156a9ca98395da76f1c01696d3a378e7eb27dc0da213d4de99d0afa121d00503c856f05b8b9825e984c129f341b85

  • SSDEEP

    98304:08qPoBhz1aRxcSUDk36SAEdhvxWa9P5uB/nZ/9SL2:08qPe1Cxcxk3ZAEUadwbi2

Malware Config

Targets

    • Target

      2025-01-13_2b2d4c951bf03fda3c69510592ed5570_wannacry

    • Size

      4.1MB

    • MD5

      2b2d4c951bf03fda3c69510592ed5570

    • SHA1

      3c90652b4dd4f84bdcb31edc32c58a24c7c5ea45

    • SHA256

      c484d410fa1fc64f6e86e9fa9952dfee5854fc68df6fee46bd1696f72703d453

    • SHA512

      9945a6e595714a0a2b774d34725383870ab156a9ca98395da76f1c01696d3a378e7eb27dc0da213d4de99d0afa121d00503c856f05b8b9825e984c129f341b85

    • SSDEEP

      98304:08qPoBhz1aRxcSUDk36SAEdhvxWa9P5uB/nZ/9SL2:08qPe1Cxcxk3ZAEUadwbi2

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Contacts a large (3324) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks