Table of Contents
Family Samples by Code Reuse
This is a list of public samples that share code with the malware families detected from the analyzed file.
Below is a list of samples that share one or more WannaCry code ‘genes’ with the analyzed file:
Let’s take two examples:
- The first sample in the list shares 362 genes with the analyzed file, which are 100% of the total “WannaCry” genes that found in the analyzed file.
- The second sample in the list shares 357 genes with the analyzed file, which are 98.62% of the total “WannaCry” genes in the analyzed file.
The Shared Code section displays the assembly code behind ‘genes’ of the specific malware family. Intezer Analyze divides the code up into clusters of associated blocks of code.
In the picture below, you can see all the “WannaCry” genes code:
For deeper investigation options, use the Intezer Analyze IDA Pro Plugin (which is an executable disassembler) for deeper investigation in reverse engineering of the code.