General
-
Target
7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030
-
Size
189KB
-
Sample
220220-gevkcaacfj
-
MD5
090826c3c34fb53a639f1d2919e1b44c
-
SHA1
ab355fed7323cb1dfaf1e32833acd77ffa23c287
-
SHA256
7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030
-
SHA512
d0ac51019f6d2652ae285b99fb68cbe5e3f2acf9cfa30b9d26d95e9692a5562fb8e5f5656afb55c71d191617be4336dd9b4dd7dad8b5f9107f7c9fd4789a7720
Static task
static1
Behavioral task
behavioral1
Sample
7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\RyukReadMe.html
ryuk
Targets
-
-
Target
7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030
-
Size
189KB
-
MD5
090826c3c34fb53a639f1d2919e1b44c
-
SHA1
ab355fed7323cb1dfaf1e32833acd77ffa23c287
-
SHA256
7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030
-
SHA512
d0ac51019f6d2652ae285b99fb68cbe5e3f2acf9cfa30b9d26d95e9692a5562fb8e5f5656afb55c71d191617be4336dd9b4dd7dad8b5f9107f7c9fd4789a7720
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-