General
-
Target
66973026e9f6c24e4e88f631fc72efb4c9096e67e9e726486cea4c2986512ebe
-
Size
200KB
-
Sample
220220-g6z9xaheh4
-
MD5
ebcadf583bfc61ebb3dd8a119527d829
-
SHA1
259be1414a0ac7892dddea0259b41094150b8d3d
-
SHA256
66973026e9f6c24e4e88f631fc72efb4c9096e67e9e726486cea4c2986512ebe
-
SHA512
9d1099a3cd7675b2baebd2b9b67db42800f0afd33c8ff326155c54e16328bf0b477cfff6fa3785921f1b62eeca8b8ece9afd01cdc3f6fd9f3751e5603c3a87bb
Static task
static1
Behavioral task
behavioral1
Sample
66973026e9f6c24e4e88f631fc72efb4c9096e67e9e726486cea4c2986512ebe.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
66973026e9f6c24e4e88f631fc72efb4c9096e67e9e726486cea4c2986512ebe.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.html
ryuk
Extracted
C:\RyukReadMe.html
ryuk
Targets
-
-
Target
66973026e9f6c24e4e88f631fc72efb4c9096e67e9e726486cea4c2986512ebe
-
Size
200KB
-
MD5
ebcadf583bfc61ebb3dd8a119527d829
-
SHA1
259be1414a0ac7892dddea0259b41094150b8d3d
-
SHA256
66973026e9f6c24e4e88f631fc72efb4c9096e67e9e726486cea4c2986512ebe
-
SHA512
9d1099a3cd7675b2baebd2b9b67db42800f0afd33c8ff326155c54e16328bf0b477cfff6fa3785921f1b62eeca8b8ece9afd01cdc3f6fd9f3751e5603c3a87bb
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-