General
-
Target
goBnh.exe
-
Size
152KB
-
Sample
210810-brnpw4s35j
-
MD5
32cbc69f85cc47d8e35dc20dfbda6948
-
SHA1
35dd5239977c2922a06389061cca846ec09453bb
-
SHA256
795db7bdad1befdd3ad942be79715f6b0c5083d859901b81657b590c9628790f
-
SHA512
f485a56c783dba3c15d691709a6736d5589194ec8f54e8d01342e7d6f4c54b4a56eae0fa49e150e8a13780fcb7e2e50337c8eaa026baf51774527351b365a25c
Static task
static1
Behavioral task
behavioral1
Sample
goBnh.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
goBnh.exe
Resource
win10v20210410
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Targets
-
-
Target
goBnh.exe
-
Size
152KB
-
MD5
32cbc69f85cc47d8e35dc20dfbda6948
-
SHA1
35dd5239977c2922a06389061cca846ec09453bb
-
SHA256
795db7bdad1befdd3ad942be79715f6b0c5083d859901b81657b590c9628790f
-
SHA512
f485a56c783dba3c15d691709a6736d5589194ec8f54e8d01342e7d6f4c54b4a56eae0fa49e150e8a13780fcb7e2e50337c8eaa026baf51774527351b365a25c
Score10/10-
Drops file in Drivers directory
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-