General
-
Target
astonishing-look
-
Size
170KB
-
Sample
210427-2fxnmdea86
-
MD5
e2b0300e877ec04e384520ccd9b3f81c
-
SHA1
8a6758e318b4c2aa52d04fad7aff838a1a8b1360
-
SHA256
a7145bea0b9c7094aa207508fcd54c07432e60ed89a576242f0ec6359526ccd3
-
SHA512
ae4488762855b9a802a244b141515b6e039d86f1e8d0a3b8d564537d06f2615b7d4839b6a5db128286b333f70b3dc42a8149f7af13b720faa510ff4e7617d816
Static task
static1
Behavioral task
behavioral1
Sample
astonishing-look.exe
Resource
win7v20210410
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
astonishing-look
-
Size
170KB
-
MD5
e2b0300e877ec04e384520ccd9b3f81c
-
SHA1
8a6758e318b4c2aa52d04fad7aff838a1a8b1360
-
SHA256
a7145bea0b9c7094aa207508fcd54c07432e60ed89a576242f0ec6359526ccd3
-
SHA512
ae4488762855b9a802a244b141515b6e039d86f1e8d0a3b8d564537d06f2615b7d4839b6a5db128286b333f70b3dc42a8149f7af13b720faa510ff4e7617d816
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-