General
-
Target
modern-class
-
Size
170KB
-
Sample
210427-k72vzasmps
-
MD5
94bdd553466b36524bb9308b245ed645
-
SHA1
0eedde5d39856a5f41cafff0fffbd37ec47e00b0
-
SHA256
8f31faebc04f2628683badd2054e5ea94194900b2316fb783e2bc7ab566fa9b7
-
SHA512
9563cf2fb0ea0b37b870179e45e4a82671e741dd8d6bdb38b53cff1481f4f4a88acde797ea645dc01cc82cb11f30d70d90d6486e60c2f15c4cd7ae4c1a80c892
Static task
static1
Behavioral task
behavioral1
Sample
modern-class.exe
Resource
win7v20210410
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
modern-class
-
Size
170KB
-
MD5
94bdd553466b36524bb9308b245ed645
-
SHA1
0eedde5d39856a5f41cafff0fffbd37ec47e00b0
-
SHA256
8f31faebc04f2628683badd2054e5ea94194900b2316fb783e2bc7ab566fa9b7
-
SHA512
9563cf2fb0ea0b37b870179e45e4a82671e741dd8d6bdb38b53cff1481f4f4a88acde797ea645dc01cc82cb11f30d70d90d6486e60c2f15c4cd7ae4c1a80c892
Score10/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-