General
-
Target
683c3cdeda665afca5af0d964d280f27b3fbb77185b0a24584e139c33c5edddb
-
Size
190KB
-
Sample
220220-g31fhahee9
-
MD5
65865d94596a90b7e6204deb1de53c3d
-
SHA1
282e3776f86d3b0b2916ed6047ad272fe2f0cf6e
-
SHA256
683c3cdeda665afca5af0d964d280f27b3fbb77185b0a24584e139c33c5edddb
-
SHA512
3c148f68856bf284f1775eb67a47ba880d4f69f8d6180a436a860484935c05d95ba5a3ff13e9c4280bb553f49e4f818ffce6e0a6016323d836cabe69bf8be7f5
Static task
static1
Behavioral task
behavioral1
Sample
683c3cdeda665afca5af0d964d280f27b3fbb77185b0a24584e139c33c5edddb.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
683c3cdeda665afca5af0d964d280f27b3fbb77185b0a24584e139c33c5edddb.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Targets
-
-
Target
683c3cdeda665afca5af0d964d280f27b3fbb77185b0a24584e139c33c5edddb
-
Size
190KB
-
MD5
65865d94596a90b7e6204deb1de53c3d
-
SHA1
282e3776f86d3b0b2916ed6047ad272fe2f0cf6e
-
SHA256
683c3cdeda665afca5af0d964d280f27b3fbb77185b0a24584e139c33c5edddb
-
SHA512
3c148f68856bf284f1775eb67a47ba880d4f69f8d6180a436a860484935c05d95ba5a3ff13e9c4280bb553f49e4f818ffce6e0a6016323d836cabe69bf8be7f5
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-