General
-
Target
05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012
-
Size
148KB
-
Sample
220219-kl4y5sbabq
-
MD5
ff13e065cd7fe469f4aac4fcdcd55359
-
SHA1
b16de52db11a6cf5a60f3f6cde49a52a1370e9b4
-
SHA256
05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012
-
SHA512
f916e17a2cd09b617b9d660b6b8a021f759468c18df776674e48a171ef1615b7f3f545b5de1d9c70635a3a123a78fa55bc55a7e0ef05857c476bab0b633bb101
Static task
static1
Behavioral task
behavioral1
Sample
05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14aJo5L9PTZhv8XX6qRPncbTXecb8Qohqb
Targets
-
-
Target
05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012
-
Size
148KB
-
MD5
ff13e065cd7fe469f4aac4fcdcd55359
-
SHA1
b16de52db11a6cf5a60f3f6cde49a52a1370e9b4
-
SHA256
05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012
-
SHA512
f916e17a2cd09b617b9d660b6b8a021f759468c18df776674e48a171ef1615b7f3f545b5de1d9c70635a3a123a78fa55bc55a7e0ef05857c476bab0b633bb101
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-