General
-
Target
present-evidence
-
Size
170KB
-
Sample
210427-12x2gdxl2x
-
MD5
f8b4e1f992524d675052d26e1a464803
-
SHA1
771d3a140959a1c1890351a842fe8c63e4da6eb7
-
SHA256
efbdbacda5b2b84165f3d4a5a974f98032b3f0dd2733188e079cda131671bde5
-
SHA512
ea80225dac886a7543ee49d0fb2c4ada057ae489f18da02653a1978808e2501e64e558a0dab9b3dd0512dfbff7180d2749632763a84d17e933d73dd2975aa04e
Static task
static1
Behavioral task
behavioral1
Sample
present-evidence.exe
Resource
win7v20210408
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
present-evidence
-
Size
170KB
-
MD5
f8b4e1f992524d675052d26e1a464803
-
SHA1
771d3a140959a1c1890351a842fe8c63e4da6eb7
-
SHA256
efbdbacda5b2b84165f3d4a5a974f98032b3f0dd2733188e079cda131671bde5
-
SHA512
ea80225dac886a7543ee49d0fb2c4ada057ae489f18da02653a1978808e2501e64e558a0dab9b3dd0512dfbff7180d2749632763a84d17e933d73dd2975aa04e
Score10/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-