General

  • Target

    f8a8f431ef21e834e8394c3af827e12ac27069ef4a73836947c995e4c43a8ea0

  • Size

    123KB

  • Sample

    220220-afzr5afffn

  • MD5

    e371e72f85e66bbce078bcd1bee7e4a7

  • SHA1

    d5231df9c4bc1e7e438a382a6a143362ced25476

  • SHA256

    f8a8f431ef21e834e8394c3af827e12ac27069ef4a73836947c995e4c43a8ea0

  • SHA512

    8ec28f15e90d20b31f1ef702f00f8b66e46fab60faff4a0a666e8efa56e0285cb1cdc87a2106e2a7f39ce3d2b429fbc757704c0a4747bbc9305b39106a0c3cda

Malware Config

Extracted

Path

C:\users\Public\RyukReadMe.html

Family

ryuk

Ransom Note
contact balance of shadow universe Ryuk $password = 'tKPGaxUEJ1'; $torlink = 'http://oc6mkf4efqrjp2ue6qp6vmz4ofyjmlo6dtqiklqb2q546bnqeu66tbyd.onion'; function info(){alert("INSTRUCTION:\r\n1. Download tor browser.\r\n2. Open link through tor browser: " + $torlink + "\r\n3. Fill the form, your password: "+ $password +"\r\nWe will contact you shortly.\r\nAlways send files for test decryption.");};
URLs

http://oc6mkf4efqrjp2ue6qp6vmz4ofyjmlo6dtqiklqb2q546bnqeu66tbyd.onion

Targets

    • Target

      f8a8f431ef21e834e8394c3af827e12ac27069ef4a73836947c995e4c43a8ea0

    • Size

      123KB

    • MD5

      e371e72f85e66bbce078bcd1bee7e4a7

    • SHA1

      d5231df9c4bc1e7e438a382a6a143362ced25476

    • SHA256

      f8a8f431ef21e834e8394c3af827e12ac27069ef4a73836947c995e4c43a8ea0

    • SHA512

      8ec28f15e90d20b31f1ef702f00f8b66e46fab60faff4a0a666e8efa56e0285cb1cdc87a2106e2a7f39ce3d2b429fbc757704c0a4747bbc9305b39106a0c3cda

    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

MITRE ATT&CK Enterprise v6

Tasks