

Rewterz Threat Alert – APT MustangPanda – Active IOCs
March 17, 2022
Rewterz Threat Alert – Nanocore Rat – Active IOCs
March 17, 2022
Rewterz Threat Alert – APT MustangPanda – Active IOCs
March 17, 2022
Rewterz Threat Alert – Nanocore Rat – Active IOCs
March 17, 2022Severity
High
Analysis Summary
WannaCry – aka WCry or WanaCrptor – is one of the most dangerous ransomware infections that initially surfaced in a worldwide strike in May 2017, affecting over 150 nations. This ransomware outbreak in 2017 wreaked havoc on hospitals, banks, and telecommunication firms all around the world. It has worm-like qualities and uses the SMBv1 vulnerability EternalBlue to propagate through a computer network. WannaCry encrypts user data and demands a Bitcoin payment in order to unlock them.
Impact
- File Encryption
Indicators of Compromise
MD5
- 596c597545956805f12b8cfcf140bbcf
- 769798a75234dc8a5d090a0882ae37b0
- 1489a8abbe878f661e362752266fa7cc
- e89250df5347a52b8db64cd61cfdeff0
- 437703982f02265d7f2dd8c77394302b
SHA-256
- 29823fafadc960a09387137dd122c5b9bcc2a5a3c54ddf1ff96e1598406947bc
- d869ca02afabeb33497322e8cdb34662b3f6307d9ffc051652b6b2eb82161260
- 62075e78e328cffd8e2ea8fafdaba8096cc3a7d6283f18b61f7abbacb5eb2888
- dd2048da0cea1071c4a001e6e090fa71aae237587c108f2ecabd7c2c8e66c68a
- 3975ab1113b94b08bf26e7d5ef1ca4d1995bf0101a0b6684109bf4ff6968e2e4
SHA-1
- 730b24ecd5102898605a989a83a26c2a01473926
- 564c6fc9a0b91564167320b58bf8fb3db36ed564
- 4aeb532650a00a031c40d0ffdf505d9c172f4884
- d4ac33b9003d20c5376dee0e27c0cb99bf3dc766
- 5d9c26e127a8944f593b0685ef00b40622bca372
Remediation
- Block all threat indicators at your respective controls
- Search for IOCs in your environment.