Resubmissions

04-07-2024 11:25

240704-njkn9sycpd 10

04-07-2024 10:31

240704-mkf7sswbnj 10

04-07-2024 09:44

240704-lqjpfaxarc 10

General

  • Target

    8623833369df77caf48fea8fbb02991288ec704408a6b2ab8f080e50c073bde3

  • Size

    5.0MB

  • Sample

    240704-njkn9sycpd

  • MD5

    ee5f76b5cc4312095074df3967b13617

  • SHA1

    254d83a07c6171e926d624080d60c0715fb19f13

  • SHA256

    8623833369df77caf48fea8fbb02991288ec704408a6b2ab8f080e50c073bde3

  • SHA512

    2f9e0aeb58827a6564efc495e4e195a930c75e7892761346094af58a7250789bc55e80e88be73a80f60b4a403671eadbd9e98c5c88325a73d813e6102bef5fa4

  • SSDEEP

    49152:znAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9:TDqPoBhz1aRxcSUDk36SAEdhvxWa9

Malware Config

Targets

    • Target

      8623833369df77caf48fea8fbb02991288ec704408a6b2ab8f080e50c073bde3

    • Size

      5.0MB

    • MD5

      ee5f76b5cc4312095074df3967b13617

    • SHA1

      254d83a07c6171e926d624080d60c0715fb19f13

    • SHA256

      8623833369df77caf48fea8fbb02991288ec704408a6b2ab8f080e50c073bde3

    • SHA512

      2f9e0aeb58827a6564efc495e4e195a930c75e7892761346094af58a7250789bc55e80e88be73a80f60b4a403671eadbd9e98c5c88325a73d813e6102bef5fa4

    • SSDEEP

      49152:znAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9:TDqPoBhz1aRxcSUDk36SAEdhvxWa9

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3403) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Network Service Discovery

2
T1046

Query Registry

2
T1012

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks