Static task
static1
Behavioral task
behavioral1
Sample
6f06e5a8bdf983ec73177ef63ea053d391b46915a7dd1fbd0ddea5c70471f593.exe
Resource
win7-en-20210916
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6f06e5a8bdf983ec73177ef63ea053d391b46915a7dd1fbd0ddea5c70471f593.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
ryuk.zip
-
Size
72KB
-
MD5
31b1d1b16cde18e535305519cf92d562
-
SHA1
96aecefc0e435fd8d2cb6ee42bdc6bd949794bd5
-
SHA256
e89e811628fdfc27eb0ce1176e08dc0f5a01c40ad282fc916996fc7590421041
-
SHA512
5ea771623f39655b651f822de0850ae5c60403a299c3d368c6703bd558342bcffa987002b62f79472e3dca9ea543c415509d8bdf3924d4a8d3372fe8011fc010
Score
10/10
Malware Config
Signatures
-
Sidoh Payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/6f06e5a8bdf983ec73177ef63ea053d391b46915a7dd1fbd0ddea5c70471f593 family_sidoh -
Sidoh family
Files
-
ryuk.zip.zip
Password: infected
-
6f06e5a8bdf983ec73177ef63ea053d391b46915a7dd1fbd0ddea5c70471f593.exe windows x86