General
-
Target
473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8
-
Size
116KB
-
Sample
210710-6tf2lv22l6
-
MD5
5c6273b024c93c5bdf557813868f9337
-
SHA1
eafe0287e6ae983c6f1ff68f6c7780cc3a037783
-
SHA256
473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8
-
SHA512
4164f5d7f485cc95825cd6608e0a58eadd456d00145bc3b73d3526e07faaf9d416d03e9a62c8c789db447549421cfc2db73f54f5cd3dabc1238c5da9727c2408
Static task
static1
Behavioral task
behavioral1
Sample
473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8.exe
Resource
win10v20210410
Malware Config
Extracted
C:\$Recycle.Bin\RyukReadMe.html
ryuk
http://lgjpuim5fe3pejmllygcffape3djui6k2a5pcbpuyvps3h4ajb7yf4id.onion
Targets
-
-
Target
473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8
-
Size
116KB
-
MD5
5c6273b024c93c5bdf557813868f9337
-
SHA1
eafe0287e6ae983c6f1ff68f6c7780cc3a037783
-
SHA256
473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8
-
SHA512
4164f5d7f485cc95825cd6608e0a58eadd456d00145bc3b73d3526e07faaf9d416d03e9a62c8c789db447549421cfc2db73f54f5cd3dabc1238c5da9727c2408
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Loads dropped DLL
-
Modifies file permissions
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-