General
-
Target
cde54dbada530a9c060259c6ad351b82513fb20074493acc913aa2a00a3dd50e
-
Size
121KB
-
Sample
220220-cb6qzsfef5
-
MD5
628da52a53fc3ff3e990f454928f4ea4
-
SHA1
214b361aa8de6df1785eb9039c01e046a323bfa0
-
SHA256
cde54dbada530a9c060259c6ad351b82513fb20074493acc913aa2a00a3dd50e
-
SHA512
81d4635fc11474cc3b9bd70d93989176266d66791c521d5af8bda8f89b8ee2ebfc4224947ce977e2997cc9ce143b67b7c1715672e2f5e7156f41c49c923f01a7
Static task
static1
Behavioral task
behavioral1
Sample
cde54dbada530a9c060259c6ad351b82513fb20074493acc913aa2a00a3dd50e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
cde54dbada530a9c060259c6ad351b82513fb20074493acc913aa2a00a3dd50e.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
http://ddchw6p2kegymsyoqljqnsslebfh5t7e45s6m2pqhhn5mt4yb3rlazyd.onion
Targets
-
-
Target
cde54dbada530a9c060259c6ad351b82513fb20074493acc913aa2a00a3dd50e
-
Size
121KB
-
MD5
628da52a53fc3ff3e990f454928f4ea4
-
SHA1
214b361aa8de6df1785eb9039c01e046a323bfa0
-
SHA256
cde54dbada530a9c060259c6ad351b82513fb20074493acc913aa2a00a3dd50e
-
SHA512
81d4635fc11474cc3b9bd70d93989176266d66791c521d5af8bda8f89b8ee2ebfc4224947ce977e2997cc9ce143b67b7c1715672e2f5e7156f41c49c923f01a7
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-