General
-
Target
plant-mood
-
Size
154KB
-
Sample
210427-3fmk8f9lf2
-
MD5
331e0f8acc9e862fc88c5d3c3a692451
-
SHA1
1154b6d321781cae818ca565eff78725189b29e2
-
SHA256
0d1a109933d886cceebfed38ae78acbd792dfba3e116ffb6e867f58fb4c592d0
-
SHA512
c55cfe084291a2dab7fa5d3f6194983447e0601ffd27e2311346672f6f34f792fa63c9584f9fbb9be1b4c81ca76d8c827cc47297e6e3197deef34ab20f451e1a
Static task
static1
Behavioral task
behavioral1
Sample
plant-mood.exe
Resource
win7v20210408
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
1E4fQqzCvS8wgqy5T7n1DW8JMNMaUbeFAS
Targets
-
-
Target
plant-mood
-
Size
154KB
-
MD5
331e0f8acc9e862fc88c5d3c3a692451
-
SHA1
1154b6d321781cae818ca565eff78725189b29e2
-
SHA256
0d1a109933d886cceebfed38ae78acbd792dfba3e116ffb6e867f58fb4c592d0
-
SHA512
c55cfe084291a2dab7fa5d3f6194983447e0601ffd27e2311346672f6f34f792fa63c9584f9fbb9be1b4c81ca76d8c827cc47297e6e3197deef34ab20f451e1a
Score10/10-
Drops file in Drivers directory
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Adds Run key to start application
-
Drops file in System32 directory
-