General
-
Target
second-working
-
Size
170KB
-
Sample
210427-4z7drxlv7j
-
MD5
db7a5753e18d43598975d4f446fa4262
-
SHA1
065f0809ce702794dcea8eab0f993c0f662a45ef
-
SHA256
5f3dfd6ebbc2e717d82e9633fd023662f088cace55fefe287b4035f34fdc9850
-
SHA512
15a183d4bfc2d7c498b574219ecc998398003f49445a1725aefe6cc8430d7aee1ae6738415f60f124f836cf24677b8e80729a3909436770d040fbcac989922ec
Static task
static1
Behavioral task
behavioral1
Sample
second-working.exe
Resource
win7v20210410
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
second-working
-
Size
170KB
-
MD5
db7a5753e18d43598975d4f446fa4262
-
SHA1
065f0809ce702794dcea8eab0f993c0f662a45ef
-
SHA256
5f3dfd6ebbc2e717d82e9633fd023662f088cace55fefe287b4035f34fdc9850
-
SHA512
15a183d4bfc2d7c498b574219ecc998398003f49445a1725aefe6cc8430d7aee1ae6738415f60f124f836cf24677b8e80729a3909436770d040fbcac989922ec
Score10/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-