General
-
Target
80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05
-
Size
203KB
-
Sample
220220-fw8mvshae8
-
MD5
8431a207fab74137df795fb46732544c
-
SHA1
abb80c03d3aa69ac38f62a447636b0fc1bf21d45
-
SHA256
80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05
-
SHA512
98971c7ff9154482a53c05e725cea25f873ed88d6ac721e943bad35183ad070788f28da22ec2f8ee5fb38b862664a37c15b97bffcb5567d54c6476b1abef39db
Static task
static1
Behavioral task
behavioral1
Sample
80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Documents and Settings\RyukReadMe.html
ryuk
Targets
-
-
Target
80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05
-
Size
203KB
-
MD5
8431a207fab74137df795fb46732544c
-
SHA1
abb80c03d3aa69ac38f62a447636b0fc1bf21d45
-
SHA256
80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05
-
SHA512
98971c7ff9154482a53c05e725cea25f873ed88d6ac721e943bad35183ad070788f28da22ec2f8ee5fb38b862664a37c15b97bffcb5567d54c6476b1abef39db
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-