General

  • Target

    1328dd556749d061cd4468bf907591fde215c7b6f1755bba566d9c335e479efb.sample

  • Size

    132KB

  • Sample

    210726-tmj64h8ygj

  • MD5

    ab3681a8456319f1330f7525ec6935c3

  • SHA1

    244e178e2073247893025bd51eb7618173bbac29

  • SHA256

    1328dd556749d061cd4468bf907591fde215c7b6f1755bba566d9c335e479efb

  • SHA512

    63e795ba9d18e5de28ed390810d3d61f97d7db4e8e5f49d57d567331697a83447a4d169386b7b3b08fb76f02683aa9f9c273d4ea52ee1517370554c8e6f4d42d

Malware Config

Extracted

Path

C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\RyukReadMe.html

Family

ryuk

Ransom Note
orfhissipmay1970@protonmail.com balance of shadow universe Ryuk
Emails

orfhissipmay1970@protonmail.com

Targets

    • Target

      1328dd556749d061cd4468bf907591fde215c7b6f1755bba566d9c335e479efb.sample

    • Size

      132KB

    • MD5

      ab3681a8456319f1330f7525ec6935c3

    • SHA1

      244e178e2073247893025bd51eb7618173bbac29

    • SHA256

      1328dd556749d061cd4468bf907591fde215c7b6f1755bba566d9c335e479efb

    • SHA512

      63e795ba9d18e5de28ed390810d3d61f97d7db4e8e5f49d57d567331697a83447a4d169386b7b3b08fb76f02683aa9f9c273d4ea52ee1517370554c8e6f4d42d

    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

File Permissions Modification

1
T1222

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

4
T1082

Impact

Inhibit System Recovery

3
T1490

Tasks