General
-
Target
fd28106da79d2948865ba105fe5d342515c49a6fb216028fa52ac7d058f14684
-
Size
170KB
-
Sample
220219-3zyy6affam
-
MD5
b87e9dd18a5533a09d3e48a7a1efbcf6
-
SHA1
f041500d895259431f30907f711c7208ebde2a19
-
SHA256
fd28106da79d2948865ba105fe5d342515c49a6fb216028fa52ac7d058f14684
-
SHA512
29c6c8690bee5db3891ae083ae99de451a589546cc698869eccb92f30a50c585e0e07e54d9387893e203b74d2ec043afb84cf67ff74bbac8874c4d6ae575df90
Static task
static1
Behavioral task
behavioral1
Sample
fd28106da79d2948865ba105fe5d342515c49a6fb216028fa52ac7d058f14684.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
fd28106da79d2948865ba105fe5d342515c49a6fb216028fa52ac7d058f14684.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
fd28106da79d2948865ba105fe5d342515c49a6fb216028fa52ac7d058f14684
-
Size
170KB
-
MD5
b87e9dd18a5533a09d3e48a7a1efbcf6
-
SHA1
f041500d895259431f30907f711c7208ebde2a19
-
SHA256
fd28106da79d2948865ba105fe5d342515c49a6fb216028fa52ac7d058f14684
-
SHA512
29c6c8690bee5db3891ae083ae99de451a589546cc698869eccb92f30a50c585e0e07e54d9387893e203b74d2ec043afb84cf67ff74bbac8874c4d6ae575df90
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-