General
-
Target
xxx.exe
-
Size
212KB
-
Sample
210329-7gnmvf13x6
-
MD5
af9754aa7c14005973189c09494b50af
-
SHA1
fd4b1bdbbfc7fe46bfe3d2205641c441f796a03d
-
SHA256
30aa50598d3a153d842f3861f66cd1a8ee754f850ee2429aa739975536b5be3a
-
SHA512
c6fdd0b930e573d4b3d94232e2ca624c6d21bff572d237e6f3abd9d26ee0e6eb4db0e9bd1384a5961a5da6fc44d81026534a139696b3ae6688705fa52471f887
Static task
static1
Behavioral task
behavioral1
Sample
xxx.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
xxx.exe
Resource
win10v20201028
Malware Config
Extracted
C:\$Recycle.Bin\RyukReadMe.html
ryuk
http://rk2zzyh63g5avvii4irkhymha3irblchdfj7prk6zwy23f6kahidkpqd.onion
Targets
-
-
Target
xxx.exe
-
Size
212KB
-
MD5
af9754aa7c14005973189c09494b50af
-
SHA1
fd4b1bdbbfc7fe46bfe3d2205641c441f796a03d
-
SHA256
30aa50598d3a153d842f3861f66cd1a8ee754f850ee2429aa739975536b5be3a
-
SHA512
c6fdd0b930e573d4b3d94232e2ca624c6d21bff572d237e6f3abd9d26ee0e6eb4db0e9bd1384a5961a5da6fc44d81026534a139696b3ae6688705fa52471f887
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-