General
-
Target
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f
-
Size
203KB
-
Sample
220219-j8nd8sagfq
-
MD5
ea9759d8023c9f6f269fbd0875561783
-
SHA1
1c4c718294647cb7df8dae914100394f2668715a
-
SHA256
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f
-
SHA512
2be12260b22224132c27f60c8943303c89210d58b22acc5efce03fb379d912254493df9eee97a7d1777faf7bf5702537331373711690d9621e642cf698140e81
Static task
static1
Behavioral task
behavioral1
Sample
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Targets
-
-
Target
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f
-
Size
203KB
-
MD5
ea9759d8023c9f6f269fbd0875561783
-
SHA1
1c4c718294647cb7df8dae914100394f2668715a
-
SHA256
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f
-
SHA512
2be12260b22224132c27f60c8943303c89210d58b22acc5efce03fb379d912254493df9eee97a7d1777faf7bf5702537331373711690d9621e642cf698140e81
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-