General
-
Target
onerous-discussion
-
Size
170KB
-
Sample
210427-brdqx7rpla
-
MD5
e277b386251991fe2a8744b9670b2e97
-
SHA1
05690cb02231419b3686dc51793f0cf0ac6d91fb
-
SHA256
8e7383f1890ae7c6f5d707e2e14df5d0a93f235f8d4dc6964d5ed57e6a0330a5
-
SHA512
747af73997dbb59b992627290ccbe58988ea29b4b3d08b8a897323470668cd4e0b8cd0cf5772540537d0724dda5cc8968a9eb35341a17576a394e6e4a17ff9c6
Static task
static1
Behavioral task
behavioral1
Sample
onerous-discussion.exe
Resource
win7v20210410
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
onerous-discussion
-
Size
170KB
-
MD5
e277b386251991fe2a8744b9670b2e97
-
SHA1
05690cb02231419b3686dc51793f0cf0ac6d91fb
-
SHA256
8e7383f1890ae7c6f5d707e2e14df5d0a93f235f8d4dc6964d5ed57e6a0330a5
-
SHA512
747af73997dbb59b992627290ccbe58988ea29b4b3d08b8a897323470668cd4e0b8cd0cf5772540537d0724dda5cc8968a9eb35341a17576a394e6e4a17ff9c6
Score10/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-