General

  • Target

    8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4

  • Size

    131KB

  • Sample

    220220-frlbrsaabr

  • MD5

    c9db89ba61448837bd75b73f5be395c1

  • SHA1

    2175b61a4dbe404498228ec7b9e53890bf0e0b6b

  • SHA256

    8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4

  • SHA512

    9d7e2259f5eb085e3929a69c4f3907b74c597e26462c7a7becf3ce191890e8f43b30d495a1f66d5028e3a13d07ce2dde0ada8d28cf52ee32026f2efe5e2d3cf4

Malware Config

Extracted

Path

C:\RyukReadMe.txt

Family

ryuk

Ransom Note
Your network has been penetrated. All files on each host in the network have been encrypted with a strong algorithm. Backups were either encrypted Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover. We exclusively have decryption software for your situation. More than a year ago, world experts recognized the impossibility of deciphering by any means except the original decoder. No decryption software is available in the public. Antiviruse companies, researchers, IT specialists, and no other persons cant help you encrypt the data. DO NOT RESET OR SHUTDOWN - files may be damaged. DO NOT DELETE readme files. To confirm our honest intentions.Send 2 different random files and you will get it decrypted. It can be from different computers on your network to be sure that one key decrypts everything. 2 files we unlock for free To get info (decrypt your files) contact us at [email protected] or [email protected] BTC wallet: 14aJo5L9PTZhv8XX6qRPncbTXecb8Qohqb Ryuk No system is safe
Wallets

14aJo5L9PTZhv8XX6qRPncbTXecb8Qohqb

Targets

    • Target

      8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4

    • Size

      131KB

    • MD5

      c9db89ba61448837bd75b73f5be395c1

    • SHA1

      2175b61a4dbe404498228ec7b9e53890bf0e0b6b

    • SHA256

      8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4

    • SHA512

      9d7e2259f5eb085e3929a69c4f3907b74c597e26462c7a7becf3ce191890e8f43b30d495a1f66d5028e3a13d07ce2dde0ada8d28cf52ee32026f2efe5e2d3cf4

    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks