General
-
Target
7ac8689ab907526b77e6294a8e91280b562046dc674a1a21e7f8e953821bccd9
-
Size
203KB
-
Sample
220220-f6esjaabfn
-
MD5
071ccc24faaf0a8577075b7466293e8c
-
SHA1
8beed359f92bfc5e14384783526f77049eb2cb9a
-
SHA256
7ac8689ab907526b77e6294a8e91280b562046dc674a1a21e7f8e953821bccd9
-
SHA512
454f5db75da3285cc28795078b598b8995d6a3fd586084b68c583029455a437905b5e58451992b3277ff61a1cd3b09a6107d4b94810128a738496137c4a62f90
Static task
static1
Behavioral task
behavioral1
Sample
7ac8689ab907526b77e6294a8e91280b562046dc674a1a21e7f8e953821bccd9.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7ac8689ab907526b77e6294a8e91280b562046dc674a1a21e7f8e953821bccd9.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Targets
-
-
Target
7ac8689ab907526b77e6294a8e91280b562046dc674a1a21e7f8e953821bccd9
-
Size
203KB
-
MD5
071ccc24faaf0a8577075b7466293e8c
-
SHA1
8beed359f92bfc5e14384783526f77049eb2cb9a
-
SHA256
7ac8689ab907526b77e6294a8e91280b562046dc674a1a21e7f8e953821bccd9
-
SHA512
454f5db75da3285cc28795078b598b8995d6a3fd586084b68c583029455a437905b5e58451992b3277ff61a1cd3b09a6107d4b94810128a738496137c4a62f90
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-