General
-
Target
f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682
-
Size
188KB
-
Sample
220220-akyqmaegh5
-
MD5
81a657edce1fc7c97e2e3367e676339f
-
SHA1
13a1686aaaba2c46792b468ca78f6f20a3817468
-
SHA256
f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682
-
SHA512
2233a938fa19a39d9052a2e339b18b140d9e258a9d3394219e60c636095566647faacba4ee72d007ade4c768cdece84b373f029bb19e53b3279e99f1204ee07e
Static task
static1
Behavioral task
behavioral1
Sample
f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Targets
-
-
Target
f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682
-
Size
188KB
-
MD5
81a657edce1fc7c97e2e3367e676339f
-
SHA1
13a1686aaaba2c46792b468ca78f6f20a3817468
-
SHA256
f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682
-
SHA512
2233a938fa19a39d9052a2e339b18b140d9e258a9d3394219e60c636095566647faacba4ee72d007ade4c768cdece84b373f029bb19e53b3279e99f1204ee07e
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-