General
-
Target
sharp-recording
-
Size
170KB
-
Sample
210427-qvl8bzbv7j
-
MD5
dea9c5b2594f41331a5bd4518379f6e4
-
SHA1
a3ba4a6cc9506a1c5d5789926946b3166cbcb20b
-
SHA256
98d8caafaae6458a621ba1d1a1889709d155bd7dc87b9f7dd2ed7ebd2d0d166e
-
SHA512
20d8accea3cb85bb38ba6ec6390151971dc75c84a8b471e62e4a8b718a3ac77e79bb3917fd796b69cc5b505e2ea901141f67ceac9576df810d4f481440ded94e
Static task
static1
Behavioral task
behavioral1
Sample
sharp-recording.exe
Resource
win7v20210408
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
sharp-recording
-
Size
170KB
-
MD5
dea9c5b2594f41331a5bd4518379f6e4
-
SHA1
a3ba4a6cc9506a1c5d5789926946b3166cbcb20b
-
SHA256
98d8caafaae6458a621ba1d1a1889709d155bd7dc87b9f7dd2ed7ebd2d0d166e
-
SHA512
20d8accea3cb85bb38ba6ec6390151971dc75c84a8b471e62e4a8b718a3ac77e79bb3917fd796b69cc5b505e2ea901141f67ceac9576df810d4f481440ded94e
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-