General
-
Target
6356160800915456.zip
-
Size
380KB
-
Sample
210330-gqla7ls5y6
-
MD5
f1edd6e9079c428701bf1ff2c2a91ecf
-
SHA1
cd3074ba1cc1ee426b631e2b9dc6ff14a66048d7
-
SHA256
2b23e704cfd8d62a359ef0325bfd4aaef5249cf6567ab8eceb88395978e3291a
-
SHA512
98fa7540e165557158497ad1e9e955dd4c026b156eb27d62b82c261d65f924e30b5a691fb9847a5f97550b45a20710a3491ddbeb42084e4fb81dea5a3b4f2dca
Static task
static1
Behavioral task
behavioral1
Sample
e803f1a1acf079ff2ca62e02c924840a9334336e762b0992123035427ffbf894.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
e803f1a1acf079ff2ca62e02c924840a9334336e762b0992123035427ffbf894.exe
Resource
win10v20201028
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
http://etnbhivw5fjqytbmvt2o6zle3avqn6rrugfc35kmcmedbbgqbxtknlqd.onion
Targets
-
-
Target
e803f1a1acf079ff2ca62e02c924840a9334336e762b0992123035427ffbf894
-
Size
836KB
-
MD5
c5cd1f0fe551a0ce5678a7c9d86e6450
-
SHA1
f584c89c1539520f280efd9bcd4cb3da37588979
-
SHA256
e803f1a1acf079ff2ca62e02c924840a9334336e762b0992123035427ffbf894
-
SHA512
40f9578b711e41cd166b24b8aa0bfb6dee01a8e4a46eb54591e61d97cfc5a83dc58fb4256dc05f756274cda65ad5d680f9e370ad0c825861fd7080e5da5fd2e4
Score10/10-
Dave packer
Detects executable packed with a packer named 'Dave' from the community, due to a string at the end of it.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Drops desktop.ini file(s)
-