General
-
Target
adhesive-independent
-
Size
170KB
-
Sample
210427-r7zsasd1h6
-
MD5
e2bea7fb150572f145cb92879390d9ef
-
SHA1
ef2b19e4b0b8732f2d1c6d680fd726537e40aaf4
-
SHA256
68c795910d0a3e1a629a306f31abae558fc116b81d1ca562fea6111119fe758b
-
SHA512
058ee68f3e22f9fe2ac7bd6c00fa8e82ec0329bb6d2966f07121b51668cd9225a6a7754a3e536b01dbc3f436e01660fe097b9aa9761c4e6e0da9a9ce1b958c70
Static task
static1
Behavioral task
behavioral1
Sample
adhesive-independent.exe
Resource
win7v20210408
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
adhesive-independent
-
Size
170KB
-
MD5
e2bea7fb150572f145cb92879390d9ef
-
SHA1
ef2b19e4b0b8732f2d1c6d680fd726537e40aaf4
-
SHA256
68c795910d0a3e1a629a306f31abae558fc116b81d1ca562fea6111119fe758b
-
SHA512
058ee68f3e22f9fe2ac7bd6c00fa8e82ec0329bb6d2966f07121b51668cd9225a6a7754a3e536b01dbc3f436e01660fe097b9aa9761c4e6e0da9a9ce1b958c70
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-