General
-
Target
0eb86390d13f331d7fd777acd750a759e447c907e38653adb6508c12c41f03d0
-
Size
170KB
-
Sample
220219-j5wansagdl
-
MD5
e83e446765df038755ff52cf5d311b6c
-
SHA1
79f3c9691cd5d68ad289ba6a0c17e1a587d5c48b
-
SHA256
0eb86390d13f331d7fd777acd750a759e447c907e38653adb6508c12c41f03d0
-
SHA512
f6bbb71e53ac8e61fff0cbb2ab4ab25b40d29f5a537379eb8339f552eac68b7237cfd2dcb77783d2faa6aa582cb70c3ce4703a7ed9ed0dacdf413c1d60b1c63e
Static task
static1
Behavioral task
behavioral1
Sample
0eb86390d13f331d7fd777acd750a759e447c907e38653adb6508c12c41f03d0.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0eb86390d13f331d7fd777acd750a759e447c907e38653adb6508c12c41f03d0.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
0eb86390d13f331d7fd777acd750a759e447c907e38653adb6508c12c41f03d0
-
Size
170KB
-
MD5
e83e446765df038755ff52cf5d311b6c
-
SHA1
79f3c9691cd5d68ad289ba6a0c17e1a587d5c48b
-
SHA256
0eb86390d13f331d7fd777acd750a759e447c907e38653adb6508c12c41f03d0
-
SHA512
f6bbb71e53ac8e61fff0cbb2ab4ab25b40d29f5a537379eb8339f552eac68b7237cfd2dcb77783d2faa6aa582cb70c3ce4703a7ed9ed0dacdf413c1d60b1c63e
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-