General
-
Target
ddd788ff3ce2b36c84941bee081ec22aa3ad1f43c49f417d57b975f0dd3683a0
-
Size
118KB
-
Sample
220220-bqtvasfcg3
-
MD5
347eeae717c9af712bef4146374ea162
-
SHA1
0b90db0136415072ade13f090dd99f8f3cb96404
-
SHA256
ddd788ff3ce2b36c84941bee081ec22aa3ad1f43c49f417d57b975f0dd3683a0
-
SHA512
cc66b1bccc65cf5a86d698d523a1217ec2e40d8fd005ab81891fef9d5008a044987fb9ec90e140c3dec650747c87a00aee3c7db8f332918e251eff95bc60c949
Static task
static1
Behavioral task
behavioral1
Sample
ddd788ff3ce2b36c84941bee081ec22aa3ad1f43c49f417d57b975f0dd3683a0.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ddd788ff3ce2b36c84941bee081ec22aa3ad1f43c49f417d57b975f0dd3683a0.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
http://shemngcwq3kbpigejjxj5toggdqrfqq6qagp556yxglfxe4qq4xuc4yd.onion
Targets
-
-
Target
ddd788ff3ce2b36c84941bee081ec22aa3ad1f43c49f417d57b975f0dd3683a0
-
Size
118KB
-
MD5
347eeae717c9af712bef4146374ea162
-
SHA1
0b90db0136415072ade13f090dd99f8f3cb96404
-
SHA256
ddd788ff3ce2b36c84941bee081ec22aa3ad1f43c49f417d57b975f0dd3683a0
-
SHA512
cc66b1bccc65cf5a86d698d523a1217ec2e40d8fd005ab81891fef9d5008a044987fb9ec90e140c3dec650747c87a00aee3c7db8f332918e251eff95bc60c949
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-