General
-
Target
towering-self
-
Size
170KB
-
Sample
210427-6lp17y6pqe
-
MD5
f3e6e7e502eca5920215b6b03d388cb7
-
SHA1
3f364a481ea56a248dd4493400c10362cf48a3ff
-
SHA256
d60b2f5e3e76368744a64f8bad795a46dab2d688aef700a59454a21d1d373fd7
-
SHA512
c6ea4ab5241577bd89343e7843df974024e2289473a032eb62aeaa653892b4904f42527336a3403eacaf64e941174b574b892ee8b8beb21266993d0afb8cb759
Static task
static1
Behavioral task
behavioral1
Sample
towering-self.exe
Resource
win7v20210408
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
towering-self
-
Size
170KB
-
MD5
f3e6e7e502eca5920215b6b03d388cb7
-
SHA1
3f364a481ea56a248dd4493400c10362cf48a3ff
-
SHA256
d60b2f5e3e76368744a64f8bad795a46dab2d688aef700a59454a21d1d373fd7
-
SHA512
c6ea4ab5241577bd89343e7843df974024e2289473a032eb62aeaa653892b4904f42527336a3403eacaf64e941174b574b892ee8b8beb21266993d0afb8cb759
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-