General
-
Target
Tes (2).exe
-
Size
154KB
-
Sample
210820-d2bzkam6j6
-
MD5
c77b4fb1f7ecbc8fb310b79bd5feb68c
-
SHA1
47eaa1fd7524a0a34b5112c7b270f0747f9d0a51
-
SHA256
3a7b94a46f82a62500f5bad83c351252262e86a6577b5423eb2ebce12f2f54e8
-
SHA512
d5e08fd632fe081c8cc085c91f234add57a778b9b4f37d402399cd46d5cfefe65b8c6ff89c47348e1b3ae844b0d772a3be0a27e0a4367712123ee03a9f36d724
Static task
static1
Behavioral task
behavioral1
Sample
Tes (2).exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Tes (2).exe
Resource
win10v20210408
Malware Config
Extracted
C:\Users\Admin\Desktop\EncReadMe.html
ryuk
Targets
-
-
Target
Tes (2).exe
-
Size
154KB
-
MD5
c77b4fb1f7ecbc8fb310b79bd5feb68c
-
SHA1
47eaa1fd7524a0a34b5112c7b270f0747f9d0a51
-
SHA256
3a7b94a46f82a62500f5bad83c351252262e86a6577b5423eb2ebce12f2f54e8
-
SHA512
d5e08fd632fe081c8cc085c91f234add57a778b9b4f37d402399cd46d5cfefe65b8c6ff89c47348e1b3ae844b0d772a3be0a27e0a4367712123ee03a9f36d724
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-