General
-
Target
thundering-primary
-
Size
170KB
-
Sample
210427-sddm7x1fja
-
MD5
f8a2e208360967200b4ac5408aed5556
-
SHA1
0a4fb1d82225fc7aefe1cc0468022faebbc00a5b
-
SHA256
b770fb365d1739543878652d8bc885eab35e7ee078635016b7682334e1d6f09d
-
SHA512
e2cdd4d4094731cab5655f5e87eec3eff7a91a4ad8617ad258a6e11557f59ba117eea7d2d40b325df220b94a44be5f9ffd745ab316f88487ca8cb6697614e21a
Static task
static1
Behavioral task
behavioral1
Sample
thundering-primary.exe
Resource
win7v20210410
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
thundering-primary
-
Size
170KB
-
MD5
f8a2e208360967200b4ac5408aed5556
-
SHA1
0a4fb1d82225fc7aefe1cc0468022faebbc00a5b
-
SHA256
b770fb365d1739543878652d8bc885eab35e7ee078635016b7682334e1d6f09d
-
SHA512
e2cdd4d4094731cab5655f5e87eec3eff7a91a4ad8617ad258a6e11557f59ba117eea7d2d40b325df220b94a44be5f9ffd745ab316f88487ca8cb6697614e21a
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-