General
-
Target
unequal-oven
-
Size
152KB
-
Sample
210427-n6wltgy33e
-
MD5
7a7b1300e8b5a10424e08958a6fc15c1
-
SHA1
9db96b1a4bff1ffc6b945360cc5cc363642ffc94
-
SHA256
501e925e5de6c824b5eeccb3ccc5111cf6e312258c0877634935df06b9d0f8b9
-
SHA512
ce80e5313fad830387fb758ebfbe5c77976532acfece81fc57978399261a5b6ffb3a89f0ded288483ce38f21bf9fa8f6052e4afeeec1ab202a809ecb7722eb30
Static task
static1
Behavioral task
behavioral1
Sample
unequal-oven.exe
Resource
win7v20210410
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Targets
-
-
Target
unequal-oven
-
Size
152KB
-
MD5
7a7b1300e8b5a10424e08958a6fc15c1
-
SHA1
9db96b1a4bff1ffc6b945360cc5cc363642ffc94
-
SHA256
501e925e5de6c824b5eeccb3ccc5111cf6e312258c0877634935df06b9d0f8b9
-
SHA512
ce80e5313fad830387fb758ebfbe5c77976532acfece81fc57978399261a5b6ffb3a89f0ded288483ce38f21bf9fa8f6052e4afeeec1ab202a809ecb7722eb30
Score10/10-
Drops file in Drivers directory
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-