General
-
Target
0c51ca0477a2a23eede0757f49f07891c15fe977bde5f293d05ddbce43c9531e
-
Size
386KB
-
Sample
220219-j9dleshha3
-
MD5
7bd387176c3b768d4c4c5522072f3753
-
SHA1
0ec05c75a232a16babe9e7d77d1f9165afb1aac4
-
SHA256
0c51ca0477a2a23eede0757f49f07891c15fe977bde5f293d05ddbce43c9531e
-
SHA512
dd9584273adbbbf9f6c8d951bb00b2930a89dd3db2cacdf8f24c7ce57b31e62469da62219c8fc0d3b366add12b3ca32b82a3e74e1463293b1159fd188da46024
Static task
static1
Behavioral task
behavioral1
Sample
0c51ca0477a2a23eede0757f49f07891c15fe977bde5f293d05ddbce43c9531e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0c51ca0477a2a23eede0757f49f07891c15fe977bde5f293d05ddbce43c9531e.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
0c51ca0477a2a23eede0757f49f07891c15fe977bde5f293d05ddbce43c9531e
-
Size
386KB
-
MD5
7bd387176c3b768d4c4c5522072f3753
-
SHA1
0ec05c75a232a16babe9e7d77d1f9165afb1aac4
-
SHA256
0c51ca0477a2a23eede0757f49f07891c15fe977bde5f293d05ddbce43c9531e
-
SHA512
dd9584273adbbbf9f6c8d951bb00b2930a89dd3db2cacdf8f24c7ce57b31e62469da62219c8fc0d3b366add12b3ca32b82a3e74e1463293b1159fd188da46024
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-