General

  • Target

    943a8b4e4811321db2013618261ae4b7ea7ec55b78afbe0bab7123e0ba4436f1

  • Size

    188KB

  • Sample

    220220-e2nzzahfhn

  • MD5

    a17dd2f7ad9f6aceffe1cebe038035af

  • SHA1

    3e792a39abc45eb3c10084e76c8ddaeb48cb2f93

  • SHA256

    943a8b4e4811321db2013618261ae4b7ea7ec55b78afbe0bab7123e0ba4436f1

  • SHA512

    1f968febf046ec88644d4ddfc9ba1e4180b9dad8b671f337ded2c350bbea73d2fd25b68741a649c4e0974e0db0b5bd8520092327f6b1f65b2361d2c0db859ede

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html

Family

ryuk

Ransom Note
<html><body><p style="font-weight:bold;font-size:125%;top:0;left:0;"> [email protected] <br> </p><p style="position:absolute;bottom:0;right:1%;font-weight:bold;font-size:170%">balance of shadow universe</p><div style="font-size: 550%;font-weight:bold;width:50%;height:50%;overflow:auto;margin:auto;position:absolute;top:35%;left:40%;">Ryuk</div></body></html�������������������������������������������������������������������������������������������������������������������������������������������������������

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html

Family

ryuk

Ransom Note
[email protected] balance of shadow universe Ryuk

Targets

    • Target

      943a8b4e4811321db2013618261ae4b7ea7ec55b78afbe0bab7123e0ba4436f1

    • Size

      188KB

    • MD5

      a17dd2f7ad9f6aceffe1cebe038035af

    • SHA1

      3e792a39abc45eb3c10084e76c8ddaeb48cb2f93

    • SHA256

      943a8b4e4811321db2013618261ae4b7ea7ec55b78afbe0bab7123e0ba4436f1

    • SHA512

      1f968febf046ec88644d4ddfc9ba1e4180b9dad8b671f337ded2c350bbea73d2fd25b68741a649c4e0974e0db0b5bd8520092327f6b1f65b2361d2c0db859ede

    Score
    10/10
    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks