General
-
Target
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
-
Size
9.5MB
-
Sample
220122-ah9p4sedb8
-
MD5
a91173d3707d48a5c51240b9aa710f05
-
SHA1
1d99b42d879fa8652904f87a1fa9e4a2526e2be5
-
SHA256
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
-
SHA512
6ed3bdef2ef3403f5cc0fabdafd1e514c15d6f12055833545b34c12e11f3cf3eb9a339b314c03d237e56f0e1775b332464daa28d010f8193d82a3a18a0173de1
Static task
static1
Behavioral task
behavioral1
Sample
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe
Resource
win10-en-20211208
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\млѬПОёфяЛныи.txt
ryuk
Targets
-
-
Target
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
-
Size
9.5MB
-
MD5
a91173d3707d48a5c51240b9aa710f05
-
SHA1
1d99b42d879fa8652904f87a1fa9e4a2526e2be5
-
SHA256
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
-
SHA512
6ed3bdef2ef3403f5cc0fabdafd1e514c15d6f12055833545b34c12e11f3cf3eb9a339b314c03d237e56f0e1775b332464daa28d010f8193d82a3a18a0173de1
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-