General
-
Target
473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8.sample
-
Size
116KB
-
Sample
210726-kawf5nc3bn
-
MD5
5c6273b024c93c5bdf557813868f9337
-
SHA1
eafe0287e6ae983c6f1ff68f6c7780cc3a037783
-
SHA256
473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8
-
SHA512
4164f5d7f485cc95825cd6608e0a58eadd456d00145bc3b73d3526e07faaf9d416d03e9a62c8c789db447549421cfc2db73f54f5cd3dabc1238c5da9727c2408
Static task
static1
Behavioral task
behavioral1
Sample
473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8.sample.exe
Resource
win10v20210408
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\RyukReadMe.html
ryuk
http://lgjpuim5fe3pejmllygcffape3djui6k2a5pcbpuyvps3h4ajb7yf4id.onion
Targets
-
-
Target
473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8.sample
-
Size
116KB
-
MD5
5c6273b024c93c5bdf557813868f9337
-
SHA1
eafe0287e6ae983c6f1ff68f6c7780cc3a037783
-
SHA256
473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8
-
SHA512
4164f5d7f485cc95825cd6608e0a58eadd456d00145bc3b73d3526e07faaf9d416d03e9a62c8c789db447549421cfc2db73f54f5cd3dabc1238c5da9727c2408
Score10/10-
Loads dropped DLL
-
Modifies file permissions
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-