General
-
Target
thankful-boat
-
Size
129KB
-
Sample
210427-8tm9tg9kae
-
MD5
db2766c6f43c25951cdd38304d328dc1
-
SHA1
fc62460c6ddd671085cde0138cf3d999e1db08cf
-
SHA256
aacfc3e386ed12082923d03fa1120d5fa6bf7b8655ba77e04b96a45434fa9a83
-
SHA512
87bc840be7d0ac2e30712b9bf72da9666e10abfce50cd312f56facdae606ab0c5592b910629442d17577ee521c1b93de07d2e578a446f0e817242c025cc00a2c
Static task
static1
Behavioral task
behavioral1
Sample
thankful-boat.exe
Resource
win7v20210408
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Targets
-
-
Target
thankful-boat
-
Size
129KB
-
MD5
db2766c6f43c25951cdd38304d328dc1
-
SHA1
fc62460c6ddd671085cde0138cf3d999e1db08cf
-
SHA256
aacfc3e386ed12082923d03fa1120d5fa6bf7b8655ba77e04b96a45434fa9a83
-
SHA512
87bc840be7d0ac2e30712b9bf72da9666e10abfce50cd312f56facdae606ab0c5592b910629442d17577ee521c1b93de07d2e578a446f0e817242c025cc00a2c
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Drops desktop.ini file(s)
-