General
-
Target
d672c284a23cd10cdec990be23d62e0f8862ca5a6ec9f55af7697dbaa17fda8e
-
Size
147KB
-
Sample
220220-cjdp6sffc5
-
MD5
4e3618b8f7be3a34a2aa0d0bbc815c3c
-
SHA1
c355d59793382cc448c9947e17ebff0b309bb1fe
-
SHA256
d672c284a23cd10cdec990be23d62e0f8862ca5a6ec9f55af7697dbaa17fda8e
-
SHA512
ea0c67d162a149752379675f80fc11ab64a72a049b3c87100f3f839e3b4faf84aaf32ad2087f67f402203b31f0bce999e1918715959dd3ad502bb0291b294213
Static task
static1
Behavioral task
behavioral1
Sample
d672c284a23cd10cdec990be23d62e0f8862ca5a6ec9f55af7697dbaa17fda8e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d672c284a23cd10cdec990be23d62e0f8862ca5a6ec9f55af7697dbaa17fda8e.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
1GXgngwDMSJZ1Vahmf6iexKVePPXsxGS6H
Targets
-
-
Target
d672c284a23cd10cdec990be23d62e0f8862ca5a6ec9f55af7697dbaa17fda8e
-
Size
147KB
-
MD5
4e3618b8f7be3a34a2aa0d0bbc815c3c
-
SHA1
c355d59793382cc448c9947e17ebff0b309bb1fe
-
SHA256
d672c284a23cd10cdec990be23d62e0f8862ca5a6ec9f55af7697dbaa17fda8e
-
SHA512
ea0c67d162a149752379675f80fc11ab64a72a049b3c87100f3f839e3b4faf84aaf32ad2087f67f402203b31f0bce999e1918715959dd3ad502bb0291b294213
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-