General
-
Target
unique-membership
-
Size
170KB
-
Sample
210427-ntmdc7x2rx
-
MD5
d36a375376e0ad03a104c0230aadf9cc
-
SHA1
0cf56afc7d75379bce091e30f575a7ef6aeddc3b
-
SHA256
74362795d3137d99903e1afe062754b1e3f7c5600c54ad5c1ccd76a1f2978ddc
-
SHA512
184888270df2a3909b6734f5db5cbca9c42cfca068cf2d19f10c158054a05f7bb4fadd4c698f1047482e113df47e83572d9eb83456a78a70d9c86a23ac2ccb9b
Static task
static1
Behavioral task
behavioral1
Sample
unique-membership.exe
Resource
win7v20210408
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
unique-membership
-
Size
170KB
-
MD5
d36a375376e0ad03a104c0230aadf9cc
-
SHA1
0cf56afc7d75379bce091e30f575a7ef6aeddc3b
-
SHA256
74362795d3137d99903e1afe062754b1e3f7c5600c54ad5c1ccd76a1f2978ddc
-
SHA512
184888270df2a3909b6734f5db5cbca9c42cfca068cf2d19f10c158054a05f7bb4fadd4c698f1047482e113df47e83572d9eb83456a78a70d9c86a23ac2ccb9b
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-