General
-
Target
placid-suspect
-
Size
170KB
-
Sample
210427-8ky3t1lmss
-
MD5
c03509251108bbff72135f92140899c3
-
SHA1
08062f25f1f5142576683f33c406860f8cdb3aef
-
SHA256
e3c76cf7ce6b51ebcd9dd0b2f723ed6ca2608ae660252e9ea868d173e79a32b4
-
SHA512
1cb8d824eeefbd3976f63c74cc7fe74fe0a856504d20acdb30d4ba3b36b4c66b1b8507f1614b254800f3ff3b1a1ba99e9a91d2b8e0069280419821b00d76dbf4
Static task
static1
Behavioral task
behavioral1
Sample
placid-suspect.exe
Resource
win7v20210408
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
placid-suspect
-
Size
170KB
-
MD5
c03509251108bbff72135f92140899c3
-
SHA1
08062f25f1f5142576683f33c406860f8cdb3aef
-
SHA256
e3c76cf7ce6b51ebcd9dd0b2f723ed6ca2608ae660252e9ea868d173e79a32b4
-
SHA512
1cb8d824eeefbd3976f63c74cc7fe74fe0a856504d20acdb30d4ba3b36b4c66b1b8507f1614b254800f3ff3b1a1ba99e9a91d2b8e0069280419821b00d76dbf4
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-