General
-
Target
breakable-towel
-
Size
170KB
-
Sample
210427-v5clyxmqfj
-
MD5
dbc25fcb5de8e6a22493cbae5ae8dd22
-
SHA1
0f80c4ed9c651f0878aa73a8097e603f1332752c
-
SHA256
da9bc2f8c791b9e846bc0cf0e864b2917c45d5d1062ecffe2b7153145a140f7f
-
SHA512
e4b3076313b6360d6f8ec574c96b833136fdf2962d0162ebed4d2abb47668a6fb39257087a4cc7312e60e9c12bbeec0697be54c432572f3afb3ff23e3a6519ad
Static task
static1
Behavioral task
behavioral1
Sample
breakable-towel.exe
Resource
win7v20210410
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
breakable-towel
-
Size
170KB
-
MD5
dbc25fcb5de8e6a22493cbae5ae8dd22
-
SHA1
0f80c4ed9c651f0878aa73a8097e603f1332752c
-
SHA256
da9bc2f8c791b9e846bc0cf0e864b2917c45d5d1062ecffe2b7153145a140f7f
-
SHA512
e4b3076313b6360d6f8ec574c96b833136fdf2962d0162ebed4d2abb47668a6fb39257087a4cc7312e60e9c12bbeec0697be54c432572f3afb3ff23e3a6519ad
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-