General

  • Target

    7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030

  • Size

    189KB

  • Sample

    220220-gevkcaacfj

  • MD5

    090826c3c34fb53a639f1d2919e1b44c

  • SHA1

    ab355fed7323cb1dfaf1e32833acd77ffa23c287

  • SHA256

    7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030

  • SHA512

    d0ac51019f6d2652ae285b99fb68cbe5e3f2acf9cfa30b9d26d95e9692a5562fb8e5f5656afb55c71d191617be4336dd9b4dd7dad8b5f9107f7c9fd4789a7720

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html

Family

ryuk

Ransom Note
<html><body><p style="font-weight:bold;font-size:125%;top:0;left:0;"> [email protected] <br> </p><p style="position:absolute;bottom:0;right:1%;font-weight:bold;font-size:170%">balance of shadow universe</p><div style="font-size: 550%;font-weight:bold;width:50%;height:50%;overflow:auto;margin:auto;position:absolute;top:35%;left:40%;">Ryuk</div></body></html�������������������������������������������������������������������������������������������������������������������������������������������������������

Extracted

Path

C:\RyukReadMe.html

Family

ryuk

Ransom Note
[email protected] balance of shadow universe Ryuk

Targets

    • Target

      7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030

    • Size

      189KB

    • MD5

      090826c3c34fb53a639f1d2919e1b44c

    • SHA1

      ab355fed7323cb1dfaf1e32833acd77ffa23c287

    • SHA256

      7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030

    • SHA512

      d0ac51019f6d2652ae285b99fb68cbe5e3f2acf9cfa30b9d26d95e9692a5562fb8e5f5656afb55c71d191617be4336dd9b4dd7dad8b5f9107f7c9fd4789a7720

    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

File Permissions Modification

1
T1222

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks