Looks like the malware drops the DoublePulsar backdoor, there is an nmap script for scanning you networks for any instances:
smb-double-pulsar-backdoor NSE Script
It seems that the execution flow is divided in two groups of threads: one to infect the host on the LAN, the other to infect the host on the Internet network. The first one analyses the range of IP belonging to the local network, by running the exploit Eternal Blue on all the hosts with port 445 open, the second one generates a random IP using the generator that was previously initialized and attempts to attack the 445 port to that IP. If the attack is successful, it scans the whole subnet of class C (with prefix-length of 24 bits, thus identifying any IP to adjacent, presumably belonging to the same organisation and therefore presumably vulnerable) relative to the IP that is infected, attempting to carry out new attacks.
For any attempt of attack, the malware tries to detect the presence of DoublePulsar backdoor, used where possible to infect the system in a persistent way.