General

  • Target

    f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e

  • Size

    170KB

  • Sample

    220220-aqq8qsfgen

  • MD5

    f5610fcafb7d2494e82162441c7f6a8d

  • SHA1

    0055267123ac2c5e9d2c604c88f4a157e2cdd5e4

  • SHA256

    f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e

  • SHA512

    b523ecc1110d263391d123c54976f1067e539459443e7d0ac74de518188da49b9a53ee6af88516e01da18e3448d5ff12442fbd87a55c25b32cb59a4ad6c79302

Score
10/10

Malware Config

Extracted

Path

C:\RyukReadMe.txt

Family

ryuk

Ransom Note
Your network has been penetrated. All files on each host in the network have been encrypted with a strong algorithm. Backups were either encrypted or deleted or backup disks were formatted. Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover. We exclusively have decryption software for your situation No decryption software is available in the public. DO NOT RESET OR SHUTDOWN - files may be damaged. DO NOT RENAME OR MOVE the encrypted and readme files. DO NOT DELETE readme files. This may lead to the impossibility of recovery of the certain files. To get info (decrypt your files) contact us at [email protected] or [email protected] BTC wallet: 14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk Ryuk No system is safe
Wallets

14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk

Targets

    • Target

      f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e

    • Size

      170KB

    • MD5

      f5610fcafb7d2494e82162441c7f6a8d

    • SHA1

      0055267123ac2c5e9d2c604c88f4a157e2cdd5e4

    • SHA256

      f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e

    • SHA512

      b523ecc1110d263391d123c54976f1067e539459443e7d0ac74de518188da49b9a53ee6af88516e01da18e3448d5ff12442fbd87a55c25b32cb59a4ad6c79302

    Score
    10/10
    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

MITRE ATT&CK Matrix

Tasks