General
-
Target
4519546852245504.zip
-
Size
64KB
-
Sample
210330-t8dsmabem2
-
MD5
609ec98c481fbb334de9f2f9566ff945
-
SHA1
fa9afbe6e5492a7fd398ffa6a3a41cc5765f2461
-
SHA256
8ab5e286c2970c225118f01223f4f0017b9b8565059f88b32024554203c771c6
-
SHA512
1a821dce36c919e638b2be6aff8cca2bcdfa24505c9c95e65973f5c8fe67e456fd97a04df11e3661487c61d0dee12dcfcadf6fadecdfa94d67fecc88840a2f44
Static task
static1
Behavioral task
behavioral1
Sample
b3846bc61ca63d9c10d6f559688e366061ae98fcbe82076b9e557b0beec6f327.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
b3846bc61ca63d9c10d6f559688e366061ae98fcbe82076b9e557b0beec6f327.exe
Resource
win10v20201028
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
Targets
-
-
Target
b3846bc61ca63d9c10d6f559688e366061ae98fcbe82076b9e557b0beec6f327
-
Size
115KB
-
MD5
d736f4a3fc844b4a7e970b562fbeac85
-
SHA1
fdd13c9b9e6c0e07f1215780c4ab742627e57917
-
SHA256
b3846bc61ca63d9c10d6f559688e366061ae98fcbe82076b9e557b0beec6f327
-
SHA512
7ee0ba7a2df6cc294b9955279bbfbfe7f3e167dc208b7d9290ba67bb0c516b228d1b75c7eeebcdb9090b85e8267d239889c3ad12718a281978a1aa00ad8509fe
Score10/10-
Drops file in Drivers directory
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Drops file in System32 directory
-