Resubmissions
13-07-2021 07:27
210713-ndxveajg2s 10General
-
Target
74654957ba3c9f1ce8bb513954b9deea68a5a82217806977a1247fb342db109f
-
Size
186KB
-
Sample
210713-ndxveajg2s
-
MD5
45f643feeb41a49320ba6bfdc2968f4e
-
SHA1
572c0f765ab89777ef63dd00f6c7970bc0219e06
-
SHA256
74654957ba3c9f1ce8bb513954b9deea68a5a82217806977a1247fb342db109f
-
SHA512
326b14e3e577eb8839a514f6313b45470f15ab9af90d7213ebf471015ceccbc2926282384ddabceac33ef2c2cfef7e3b04743f19dc7c1f4d11fb0a423bcd3d0e
Static task
static1
Behavioral task
behavioral1
Sample
74654957ba3c9f1ce8bb513954b9deea68a5a82217806977a1247fb342db109f.exe
Resource
win10v20210410
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Targets
-
-
Target
74654957ba3c9f1ce8bb513954b9deea68a5a82217806977a1247fb342db109f
-
Size
186KB
-
MD5
45f643feeb41a49320ba6bfdc2968f4e
-
SHA1
572c0f765ab89777ef63dd00f6c7970bc0219e06
-
SHA256
74654957ba3c9f1ce8bb513954b9deea68a5a82217806977a1247fb342db109f
-
SHA512
326b14e3e577eb8839a514f6313b45470f15ab9af90d7213ebf471015ceccbc2926282384ddabceac33ef2c2cfef7e3b04743f19dc7c1f4d11fb0a423bcd3d0e
Score10/10-
Executes dropped EXE
-