General
-
Target
35ff457Rk.bin.exe.bin
-
Size
304KB
-
Sample
210704-cwlk5vja72
-
MD5
5ecae137bf33ecbb981f3b637b06efc5
-
SHA1
371e01949b1c7316164021e38d624ffbcba3090a
-
SHA256
4f6db0454c9afe37d358d1399fe8932bec799eb257df11eccc6ab87358c4efb3
-
SHA512
753a63b1407b21cec5e50bd5ad7158917926c6502ac43ffb61e99a911371798bb05be2845598640ac018dd7d57ccddf3c1f7736d22d0b2c2edde2eb7188d0331
Static task
static1
Behavioral task
behavioral1
Sample
35ff457Rk.bin.exe.bin.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
35ff457Rk.bin.exe.bin.exe
Resource
win10v20210408
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
http://vqurn5zgys2zd5z5r5fxnfskpzr74i63ehk7ucmrlbvsuszapwoo62qd.onion
Targets
-
-
Target
35ff457Rk.bin.exe.bin
-
Size
304KB
-
MD5
5ecae137bf33ecbb981f3b637b06efc5
-
SHA1
371e01949b1c7316164021e38d624ffbcba3090a
-
SHA256
4f6db0454c9afe37d358d1399fe8932bec799eb257df11eccc6ab87358c4efb3
-
SHA512
753a63b1407b21cec5e50bd5ad7158917926c6502ac43ffb61e99a911371798bb05be2845598640ac018dd7d57ccddf3c1f7736d22d0b2c2edde2eb7188d0331
Score10/10-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-