General
-
Target
64a52f12347a9a53bfb1adeecec2a3cd09b71f080c9c2cbd9f3f3eb2c24ee3cb
-
Size
170KB
-
Sample
220220-g95c2aaffl
-
MD5
70aaa49f0a555839f4a1243687a93734
-
SHA1
89f755b3dee1dfd4fc847510fec715165c915964
-
SHA256
64a52f12347a9a53bfb1adeecec2a3cd09b71f080c9c2cbd9f3f3eb2c24ee3cb
-
SHA512
f0b28badfe31f8bd0bb147e03d48f103da6e2e529c7bd568b9e6b7c63f495770bdb90633f27c1291cbd6871dae08f7e3ff72b113b80f6ae0e3de50aeda877372
Static task
static1
Behavioral task
behavioral1
Sample
64a52f12347a9a53bfb1adeecec2a3cd09b71f080c9c2cbd9f3f3eb2c24ee3cb.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
64a52f12347a9a53bfb1adeecec2a3cd09b71f080c9c2cbd9f3f3eb2c24ee3cb.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
64a52f12347a9a53bfb1adeecec2a3cd09b71f080c9c2cbd9f3f3eb2c24ee3cb
-
Size
170KB
-
MD5
70aaa49f0a555839f4a1243687a93734
-
SHA1
89f755b3dee1dfd4fc847510fec715165c915964
-
SHA256
64a52f12347a9a53bfb1adeecec2a3cd09b71f080c9c2cbd9f3f3eb2c24ee3cb
-
SHA512
f0b28badfe31f8bd0bb147e03d48f103da6e2e529c7bd568b9e6b7c63f495770bdb90633f27c1291cbd6871dae08f7e3ff72b113b80f6ae0e3de50aeda877372
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-