General

  • Target

    08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c

  • Size

    192KB

  • Sample

    220219-kgdamahhf5

  • MD5

    38df8a5c21f7df368490f8a0a0e276f9

  • SHA1

    564641f0da5a9365a748a9589535f3b9439e5cc9

  • SHA256

    08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c

  • SHA512

    2d3aaabd9f2d1fc4438ff31717dd53667b16acfa421c0364374135ed41360a1dee78d8f51ae588017c895c192f031bf13cbbaa67b1d240ddd86025ebc06be2cf

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html

Family

ryuk

Ransom Note
<html><body><p style="font-weight:bold;font-size:125%;top:0;left:0;"> [email protected] <br> </p><p style="position:absolute;bottom:0;right:1%;font-weight:bold;font-size:170%">balance of shadow universe</p><div style="font-size: 550%;font-weight:bold;width:50%;height:50%;overflow:auto;margin:auto;position:absolute;top:35%;left:40%;">Ryuk</div></body></html�������������������������������������������������������������������������������������������������������������������������������������������������������

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html

Family

ryuk

Ransom Note
[email protected] balance of shadow universe Ryuk

Targets

    • Target

      08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c

    • Size

      192KB

    • MD5

      38df8a5c21f7df368490f8a0a0e276f9

    • SHA1

      564641f0da5a9365a748a9589535f3b9439e5cc9

    • SHA256

      08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c

    • SHA512

      2d3aaabd9f2d1fc4438ff31717dd53667b16acfa421c0364374135ed41360a1dee78d8f51ae588017c895c192f031bf13cbbaa67b1d240ddd86025ebc06be2cf

    Score
    10/10
    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks