General

  • Target

    Ryuk.Ransom.bin.zip

  • Size

    136KB

  • Sample

    210103-g4v6awcnxn

  • MD5

    8e67c5e35d8a5e4551a162124b3db5be

  • SHA1

    bcbd44876a34d3a596ce3c4383ba6ac8a46b1e56

  • SHA256

    73521579fba19f498b9a325b0b40f4f25cc90c4b5143b00a7f01cfec2d63e8c9

  • SHA512

    861c9be279edc230bfeadd473765a26cf04fc6592a591dc3bf27fc0addccac5792b53a64ee5bdb570208aa23ba6a20f113f0c5bc49f5f5835b9189a363a2534f

Malware Config

Targets

    • Target

      Ryuk.Ransom.bin

    • Size

      196KB

    • MD5

      2e66f487fedc2c5b3550a99c0f64e93c

    • SHA1

      833b671237f563cf8bd7daa82b17850c139a8261

    • SHA256

      4a64e31b6f1712e0eac920b8440bdc8fea1c3831405912ba483c3f2b18a28fc4

    • SHA512

      f25c94e6abbe0ba0577d14dff4609401f5a2c8866a4acd2e5771c020c94ae8597c66f9186543981576cc6cc368145b557aa19d3b0e29e82a203db0b22ba95c58

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Loads dropped DLL

    • Modifies file permissions

MITRE ATT&CK Enterprise v6

Tasks