General
-
Target
ce77093b54c13fbcfc399fdb3b61f13f9ab463a38f87428cf9239c53fc6c2017
-
Size
32.2MB
-
Sample
220122-av9wmsfab6
-
MD5
5aab976003bd9fd656efa03cdbb9c3da
-
SHA1
8535ea53061cfb86467c0dfc4cb9afc56ba9a828
-
SHA256
ce77093b54c13fbcfc399fdb3b61f13f9ab463a38f87428cf9239c53fc6c2017
-
SHA512
b7660b61302c06bca58b4b003d5af13c7bffab3278c5918c2968ba8982c541446f33187579a90ec764d67c4018576467b560df6b9ebe59589a41b40463d85265
Static task
static1
Behavioral task
behavioral1
Sample
ce77093b54c13fbcfc399fdb3b61f13f9ab463a38f87428cf9239c53fc6c2017.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ce77093b54c13fbcfc399fdb3b61f13f9ab463a38f87428cf9239c53fc6c2017.exe
Resource
win10-en-20211208
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\сфБщДтĐѨКК.txt
ryuk
Targets
-
-
Target
ce77093b54c13fbcfc399fdb3b61f13f9ab463a38f87428cf9239c53fc6c2017
-
Size
32.2MB
-
MD5
5aab976003bd9fd656efa03cdbb9c3da
-
SHA1
8535ea53061cfb86467c0dfc4cb9afc56ba9a828
-
SHA256
ce77093b54c13fbcfc399fdb3b61f13f9ab463a38f87428cf9239c53fc6c2017
-
SHA512
b7660b61302c06bca58b4b003d5af13c7bffab3278c5918c2968ba8982c541446f33187579a90ec764d67c4018576467b560df6b9ebe59589a41b40463d85265
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-