General
-
Target
windy-desire
-
Size
170KB
-
Sample
210427-57rp89lp9a
-
MD5
ff5a1939a1edce4cfd068978a2a21212
-
SHA1
2f5a4cd0e6840f3cc63b1ca3af213b80735af03f
-
SHA256
c714164da80d70bceb3d32b6290ac875550317f048aba37541bacc081bc309b2
-
SHA512
4f84c454dcdbe6009fbe09669b5cb43e364f1750f98eac1aebbd606ea0dbec27dccdef8bbc7a5a9eeefc7eb7cc4f322cfcb32abe33f66358c4dfaa41214aec0e
Static task
static1
Behavioral task
behavioral1
Sample
windy-desire.exe
Resource
win7v20210410
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
windy-desire
-
Size
170KB
-
MD5
ff5a1939a1edce4cfd068978a2a21212
-
SHA1
2f5a4cd0e6840f3cc63b1ca3af213b80735af03f
-
SHA256
c714164da80d70bceb3d32b6290ac875550317f048aba37541bacc081bc309b2
-
SHA512
4f84c454dcdbe6009fbe09669b5cb43e364f1750f98eac1aebbd606ea0dbec27dccdef8bbc7a5a9eeefc7eb7cc4f322cfcb32abe33f66358c4dfaa41214aec0e
Score10/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-