General
-
Target
f11c927bbdf1b8c4a2d84d68f25c9acd71fd7406acdc1ee99135904faad54d8b
-
Size
153KB
-
Sample
220220-atdrtafghm
-
MD5
a1dbf564e44044009b39571153566cbe
-
SHA1
cb432252dc9a9d5c9822fcaf331bce97bcc15b17
-
SHA256
f11c927bbdf1b8c4a2d84d68f25c9acd71fd7406acdc1ee99135904faad54d8b
-
SHA512
7887c895b269fdd14ecdd86514d65deb2653a81be2aeea3a01ee2efc48c09c021c56a5d9d899d7a0949804623f4c7ec61b479964da6223ca32d3a9cd03991140
Static task
static1
Behavioral task
behavioral1
Sample
f11c927bbdf1b8c4a2d84d68f25c9acd71fd7406acdc1ee99135904faad54d8b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f11c927bbdf1b8c4a2d84d68f25c9acd71fd7406acdc1ee99135904faad54d8b.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
15LsUgfnuGc1PsHJPcfLQJEnHm2FnGAgYC
Targets
-
-
Target
f11c927bbdf1b8c4a2d84d68f25c9acd71fd7406acdc1ee99135904faad54d8b
-
Size
153KB
-
MD5
a1dbf564e44044009b39571153566cbe
-
SHA1
cb432252dc9a9d5c9822fcaf331bce97bcc15b17
-
SHA256
f11c927bbdf1b8c4a2d84d68f25c9acd71fd7406acdc1ee99135904faad54d8b
-
SHA512
7887c895b269fdd14ecdd86514d65deb2653a81be2aeea3a01ee2efc48c09c021c56a5d9d899d7a0949804623f4c7ec61b479964da6223ca32d3a9cd03991140
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-