General
-
Target
proud-medicine
-
Size
170KB
-
Sample
210427-8d358zcybs
-
MD5
e0af2b906d1b728b91b50bc7f06614b7
-
SHA1
27ccc1994d061d0c4697785cd4dc88b328ff6a82
-
SHA256
82db7303d3bdced549080292b43ddb3ff361ae45a984ebc5c94ac42f3962a824
-
SHA512
867faed8015879f9b7ac120619ceb0fcfae5a0af7bd6c816d917db47dde9b7be0400bd1681e14f105a1ac2b62de5be950dfca9b95c84e4f0e81e93daafb44be3
Static task
static1
Behavioral task
behavioral1
Sample
proud-medicine.exe
Resource
win7v20210408
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
proud-medicine
-
Size
170KB
-
MD5
e0af2b906d1b728b91b50bc7f06614b7
-
SHA1
27ccc1994d061d0c4697785cd4dc88b328ff6a82
-
SHA256
82db7303d3bdced549080292b43ddb3ff361ae45a984ebc5c94ac42f3962a824
-
SHA512
867faed8015879f9b7ac120619ceb0fcfae5a0af7bd6c816d917db47dde9b7be0400bd1681e14f105a1ac2b62de5be950dfca9b95c84e4f0e81e93daafb44be3
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-