General
-
Target
therapeutic-rule
-
Size
170KB
-
Sample
210427-hta8ys4aka
-
MD5
fc080fae536e8801a2f3400804f2734b
-
SHA1
0d79a4ebbc04b7abc268b76068335e0dd581abb4
-
SHA256
8a33e2792e0d41c6b99a1203187f650fa16a7a0c187938457bc526526f13b5c2
-
SHA512
0fc4740cd0601d2b382625a940e3d68479fca6fefefd5421b7c72a9739d0ee3676c3278866a7eb1aec49dc3102ea712fa40f11fcb33f5e7b4c784d3ae14ccd01
Static task
static1
Behavioral task
behavioral1
Sample
therapeutic-rule.exe
Resource
win7v20210408
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
therapeutic-rule
-
Size
170KB
-
MD5
fc080fae536e8801a2f3400804f2734b
-
SHA1
0d79a4ebbc04b7abc268b76068335e0dd581abb4
-
SHA256
8a33e2792e0d41c6b99a1203187f650fa16a7a0c187938457bc526526f13b5c2
-
SHA512
0fc4740cd0601d2b382625a940e3d68479fca6fefefd5421b7c72a9739d0ee3676c3278866a7eb1aec49dc3102ea712fa40f11fcb33f5e7b4c784d3ae14ccd01
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-