General
-
Target
rustic-exit
-
Size
170KB
-
Sample
210427-dd98lmh7kj
-
MD5
ddc6244c5569e9a1eadcf9b2ae67fb33
-
SHA1
1f866ee8de998d271c67b5261513d2385ba2acfb
-
SHA256
8051d4bd377a47df8d88b7a38ed6a6fdba0d0f65bad9b87582d7ad6eabc0dab9
-
SHA512
0ef52aa99ff9a5fc07aff11a289966b958a5154cc2803459788d47b14884405ca0e1ef6f4732b1d8f14d73ddc6d20d314623f02fe24c4f42b5226f788c561ae6
Static task
static1
Behavioral task
behavioral1
Sample
rustic-exit.exe
Resource
win7v20210408
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
rustic-exit
-
Size
170KB
-
MD5
ddc6244c5569e9a1eadcf9b2ae67fb33
-
SHA1
1f866ee8de998d271c67b5261513d2385ba2acfb
-
SHA256
8051d4bd377a47df8d88b7a38ed6a6fdba0d0f65bad9b87582d7ad6eabc0dab9
-
SHA512
0ef52aa99ff9a5fc07aff11a289966b958a5154cc2803459788d47b14884405ca0e1ef6f4732b1d8f14d73ddc6d20d314623f02fe24c4f42b5226f788c561ae6
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-