General
-
Target
703ee3222eccd0e355b9ef414be9153fa3a2ad8efb8176fee887d7744a9f632f
-
Size
117KB
-
Sample
210609-815p6f8gt2
-
MD5
31db87c5d3b970b42cb577611f851c7a
-
SHA1
8cc6a1f94514033ad8b15c3c4c720fb0eac249f1
-
SHA256
703ee3222eccd0e355b9ef414be9153fa3a2ad8efb8176fee887d7744a9f632f
-
SHA512
d00d566f7385accd173669c9f8f6868626287e0ed4a6a08b174af9f6d054b70aed3babfa91450caa085134a2e75db42802a9cc11790c923ece3a4042d161be4a
Static task
static1
Behavioral task
behavioral1
Sample
703ee3222eccd0e355b9ef414be9153fa3a2ad8efb8176fee887d7744a9f632f.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
703ee3222eccd0e355b9ef414be9153fa3a2ad8efb8176fee887d7744a9f632f.exe
Resource
win10v20210410
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
http://rdmnobnbtxh5sm3iiczazaregkpyyub3gktwneeehx62tyot5bc4qhad.onion
Targets
-
-
Target
703ee3222eccd0e355b9ef414be9153fa3a2ad8efb8176fee887d7744a9f632f
-
Size
117KB
-
MD5
31db87c5d3b970b42cb577611f851c7a
-
SHA1
8cc6a1f94514033ad8b15c3c4c720fb0eac249f1
-
SHA256
703ee3222eccd0e355b9ef414be9153fa3a2ad8efb8176fee887d7744a9f632f
-
SHA512
d00d566f7385accd173669c9f8f6868626287e0ed4a6a08b174af9f6d054b70aed3babfa91450caa085134a2e75db42802a9cc11790c923ece3a4042d161be4a
Score10/10-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Modifies file permissions
-
Drops desktop.ini file(s)
-