General
-
Target
8ee4dbbdcfbbe13669f0484b168d5d9fa7b3db7732b567c9ae507f3bdd39afd3
-
Size
130KB
-
Sample
220128-yexs5scbh8
-
MD5
80604b65968dcb6b013d182203e016ae
-
SHA1
cb80aaeaa2f500d58e390d7d5e5e7f58917a2636
-
SHA256
8ee4dbbdcfbbe13669f0484b168d5d9fa7b3db7732b567c9ae507f3bdd39afd3
-
SHA512
e7bfcc6b3495459ca0f51b2ccb4042437e940143aaf2d62074c7f004eac5bbb4f9492ce2003833f661de50995cf1336330b3f42f17ee32ca3004850104fb7818
Static task
static1
Behavioral task
behavioral1
Sample
8ee4dbbdcfbbe13669f0484b168d5d9fa7b3db7732b567c9ae507f3bdd39afd3.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
8ee4dbbdcfbbe13669f0484b168d5d9fa7b3db7732b567c9ae507f3bdd39afd3.dll
Resource
win10-en-20211208
Malware Config
Extracted
C:\JPRIKOCKA-DECRYPT.txt
ryuk
http://gandcrabmfe6mnef.onion/64b3b192f9680cc2
Targets
-
-
Target
8ee4dbbdcfbbe13669f0484b168d5d9fa7b3db7732b567c9ae507f3bdd39afd3
-
Size
130KB
-
MD5
80604b65968dcb6b013d182203e016ae
-
SHA1
cb80aaeaa2f500d58e390d7d5e5e7f58917a2636
-
SHA256
8ee4dbbdcfbbe13669f0484b168d5d9fa7b3db7732b567c9ae507f3bdd39afd3
-
SHA512
e7bfcc6b3495459ca0f51b2ccb4042437e940143aaf2d62074c7f004eac5bbb4f9492ce2003833f661de50995cf1336330b3f42f17ee32ca3004850104fb7818
Score10/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-