General
-
Target
aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c
-
Size
191KB
-
Sample
220220-dtpqvsgbe9
-
MD5
856961d44f9e6775ad573cf58c438a2a
-
SHA1
818bbf02fd1bd0eda9ee62c73b63266bf859e699
-
SHA256
aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c
-
SHA512
d6bfb664f6a1496df539c86a9b2b2b1bf3d43e252109af2f3e9dc40b566804e0b6d8ef051f953ea998391664ce8db8ea2dc5b2b4199493082e473c9b196ebc0e
Static task
static1
Behavioral task
behavioral1
Sample
aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Targets
-
-
Target
aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c
-
Size
191KB
-
MD5
856961d44f9e6775ad573cf58c438a2a
-
SHA1
818bbf02fd1bd0eda9ee62c73b63266bf859e699
-
SHA256
aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c
-
SHA512
d6bfb664f6a1496df539c86a9b2b2b1bf3d43e252109af2f3e9dc40b566804e0b6d8ef051f953ea998391664ce8db8ea2dc5b2b4199493082e473c9b196ebc0e
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-