General
-
Target
7c1e0597dd5a1e2d48c9cede54843aa7c299f7404630b5a2aafac2eec7358b20
-
Size
126KB
-
Sample
220220-f4hreahbc7
-
MD5
fca20e17ce8c0c3f3c78d82c953472ed
-
SHA1
c8ecc9b34184e7e1c15b4ed49fb838e7882dbfc6
-
SHA256
7c1e0597dd5a1e2d48c9cede54843aa7c299f7404630b5a2aafac2eec7358b20
-
SHA512
5a38ab6f0401c57e0ab1a0f889fe4db8b3fbeda0abbbb87d21da870de604615446a83f6b156ecb36d9101072d429ce7589439916404bc2e76b751847b8947152
Static task
static1
Behavioral task
behavioral1
Sample
7c1e0597dd5a1e2d48c9cede54843aa7c299f7404630b5a2aafac2eec7358b20.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7c1e0597dd5a1e2d48c9cede54843aa7c299f7404630b5a2aafac2eec7358b20.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Targets
-
-
Target
7c1e0597dd5a1e2d48c9cede54843aa7c299f7404630b5a2aafac2eec7358b20
-
Size
126KB
-
MD5
fca20e17ce8c0c3f3c78d82c953472ed
-
SHA1
c8ecc9b34184e7e1c15b4ed49fb838e7882dbfc6
-
SHA256
7c1e0597dd5a1e2d48c9cede54843aa7c299f7404630b5a2aafac2eec7358b20
-
SHA512
5a38ab6f0401c57e0ab1a0f889fe4db8b3fbeda0abbbb87d21da870de604615446a83f6b156ecb36d9101072d429ce7589439916404bc2e76b751847b8947152
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Drops desktop.ini file(s)
-