General
-
Target
data
-
Size
139KB
-
Sample
211015-sydaysbggq
-
MD5
8555b213260ba5eda4bf37652cecb431
-
SHA1
80bd92b996fce311b52aa791a8ace4b20f8fb7ab
-
SHA256
781bc4dcbd459893397a8b987bf697f5b95435dfaf7fe3f4d2224728e7a2202a
-
SHA512
0e4056303a68e4c3af5b639fdc0f434ab81452c4d06d92b97f4a8fa39383a7f963ac9dd09c4e89250678b9bc77b5f9bfd14efc294fd493ffa4c058215ba1b136
Static task
static1
Behavioral task
behavioral1
Sample
data.exe
Resource
win10-en-20210920
Malware Config
Extracted
C:\$Recycle.Bin\RyukReadMe.html
ryuk
http://htv4omqldafxwhum7ya3m37o3zcbo2d7kidcpgvp6lky62gi6czx6iqd.onion
Targets
-
-
Target
data
-
Size
139KB
-
MD5
8555b213260ba5eda4bf37652cecb431
-
SHA1
80bd92b996fce311b52aa791a8ace4b20f8fb7ab
-
SHA256
781bc4dcbd459893397a8b987bf697f5b95435dfaf7fe3f4d2224728e7a2202a
-
SHA512
0e4056303a68e4c3af5b639fdc0f434ab81452c4d06d92b97f4a8fa39383a7f963ac9dd09c4e89250678b9bc77b5f9bfd14efc294fd493ffa4c058215ba1b136
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Modifies file permissions
-
Drops desktop.ini file(s)
-