General
-
Target
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3
-
Size
385KB
-
Sample
220220-fn4zpshaa2
-
MD5
3895a370b0c69c7e23ebb5ca1598525d
-
SHA1
0eea1b978df04a50f44657bbdc520905fdcd11cc
-
SHA256
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3
-
SHA512
bc87ca0f0a4ba081e92eaab959988f29c8c0d2d338a7d679025a3d4c5921d20856b55febcc41b19c67f6a5a9f8e89bb60a11e641f54d2de62949e37ce6305f1c
Static task
static1
Behavioral task
behavioral1
Sample
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
15FC73BdkpDMUWmxo7e7gtLRtM8gQgXyb4
Targets
-
-
Target
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3
-
Size
385KB
-
MD5
3895a370b0c69c7e23ebb5ca1598525d
-
SHA1
0eea1b978df04a50f44657bbdc520905fdcd11cc
-
SHA256
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3
-
SHA512
bc87ca0f0a4ba081e92eaab959988f29c8c0d2d338a7d679025a3d4c5921d20856b55febcc41b19c67f6a5a9f8e89bb60a11e641f54d2de62949e37ce6305f1c
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-